Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MmF9tcIj1J.exe

Overview

General Information

Sample name:MmF9tcIj1J.exe
renamed because original name is a hash value
Original sample name:304cb6ee1b7c472e7779be689bae38156a157b10eb20f490026e1465154afdaa.exe
Analysis ID:1632372
MD5:ce55ef89122ca819c20629f69e69eafb
SHA1:afceee3b8dd73ffc68a7167434cbcf3a8302ef76
SHA256:304cb6ee1b7c472e7779be689bae38156a157b10eb20f490026e1465154afdaa
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MmF9tcIj1J.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\MmF9tcIj1J.exe" MD5: CE55EF89122CA819C20629F69E69EAFB)
    • MmF9tcIj1J.exe (PID: 7672 cmdline: "C:\Users\user\Desktop\MmF9tcIj1J.exe" MD5: CE55EF89122CA819C20629F69E69EAFB)
      • lq9nGfkZ7JbZdUv7.exe (PID: 4872 cmdline: "C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\MWvga3ZXJ.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • mshta.exe (PID: 8088 cmdline: "C:\Windows\SysWOW64\mshta.exe" MD5: 06B02D5C097C7DB1F109749C45F3F505)
          • lq9nGfkZ7JbZdUv7.exe (PID: 1632 cmdline: "C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\RkwEVF8IXE.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 2532 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.3692877173.0000000003180000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000A.00000002.3695080703.0000000005210000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000009.00000002.3690653132.0000000000A50000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000009.00000002.3692941025.00000000031D0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000004.00000002.1508811235.00000000017E0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            4.2.MmF9tcIj1J.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              4.2.MmF9tcIj1J.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T22:58:44.058328+010028554651A Network Trojan was detected192.168.2.649688104.21.48.180TCP
                2025-03-07T22:59:07.347671+010028554651A Network Trojan was detected192.168.2.64969313.248.169.4880TCP
                2025-03-07T22:59:20.838142+010028554651A Network Trojan was detected192.168.2.649697162.0.225.21880TCP
                2025-03-07T22:59:34.926786+010028554651A Network Trojan was detected192.168.2.64970113.228.81.3980TCP
                2025-03-07T22:59:48.530455+010028554651A Network Trojan was detected192.168.2.64970513.248.169.4880TCP
                2025-03-07T23:00:02.163304+010028554651A Network Trojan was detected192.168.2.64970913.248.169.4880TCP
                2025-03-07T23:00:16.299855+010028554651A Network Trojan was detected192.168.2.64971347.83.1.9080TCP
                2025-03-07T23:00:30.015466+010028554651A Network Trojan was detected192.168.2.649717104.21.87.3780TCP
                2025-03-07T23:00:44.033557+010028554651A Network Trojan was detected192.168.2.649721154.204.240.20080TCP
                2025-03-07T23:00:57.673983+010028554651A Network Trojan was detected192.168.2.649725178.128.48.2180TCP
                2025-03-07T23:01:11.152273+010028554651A Network Trojan was detected192.168.2.649729217.160.0.9080TCP
                2025-03-07T23:01:24.484485+010028554651A Network Trojan was detected192.168.2.649733104.21.32.180TCP
                2025-03-07T23:01:37.764957+010028554651A Network Trojan was detected192.168.2.64973713.248.169.4880TCP
                2025-03-07T23:01:51.111463+010028554651A Network Trojan was detected192.168.2.64974184.32.84.3280TCP
                2025-03-07T23:02:05.633150+010028554651A Network Trojan was detected192.168.2.64974547.83.1.9080TCP
                2025-03-07T23:02:19.722855+010028554651A Network Trojan was detected192.168.2.649749174.136.53.21880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T22:58:59.609912+010028554641A Network Trojan was detected192.168.2.64969013.248.169.4880TCP
                2025-03-07T22:59:02.165172+010028554641A Network Trojan was detected192.168.2.64969113.248.169.4880TCP
                2025-03-07T22:59:04.773307+010028554641A Network Trojan was detected192.168.2.64969213.248.169.4880TCP
                2025-03-07T22:59:13.001374+010028554641A Network Trojan was detected192.168.2.649694162.0.225.21880TCP
                2025-03-07T22:59:15.575928+010028554641A Network Trojan was detected192.168.2.649695162.0.225.21880TCP
                2025-03-07T22:59:18.144070+010028554641A Network Trojan was detected192.168.2.649696162.0.225.21880TCP
                2025-03-07T22:59:27.283344+010028554641A Network Trojan was detected192.168.2.64969813.228.81.3980TCP
                2025-03-07T22:59:29.860808+010028554641A Network Trojan was detected192.168.2.64969913.228.81.3980TCP
                2025-03-07T22:59:32.400611+010028554641A Network Trojan was detected192.168.2.64970013.228.81.3980TCP
                2025-03-07T22:59:40.698989+010028554641A Network Trojan was detected192.168.2.64970213.248.169.4880TCP
                2025-03-07T22:59:43.220849+010028554641A Network Trojan was detected192.168.2.64970313.248.169.4880TCP
                2025-03-07T22:59:45.800435+010028554641A Network Trojan was detected192.168.2.64970413.248.169.4880TCP
                2025-03-07T22:59:54.088367+010028554641A Network Trojan was detected192.168.2.64970613.248.169.4880TCP
                2025-03-07T22:59:56.585402+010028554641A Network Trojan was detected192.168.2.64970713.248.169.4880TCP
                2025-03-07T23:00:00.183233+010028554641A Network Trojan was detected192.168.2.64970813.248.169.4880TCP
                2025-03-07T23:00:08.714558+010028554641A Network Trojan was detected192.168.2.64971047.83.1.9080TCP
                2025-03-07T23:00:11.216384+010028554641A Network Trojan was detected192.168.2.64971147.83.1.9080TCP
                2025-03-07T23:00:13.823427+010028554641A Network Trojan was detected192.168.2.64971247.83.1.9080TCP
                2025-03-07T23:00:22.235938+010028554641A Network Trojan was detected192.168.2.649714104.21.87.3780TCP
                2025-03-07T23:00:24.839795+010028554641A Network Trojan was detected192.168.2.649715104.21.87.3780TCP
                2025-03-07T23:00:27.384289+010028554641A Network Trojan was detected192.168.2.649716104.21.87.3780TCP
                2025-03-07T23:00:36.400697+010028554641A Network Trojan was detected192.168.2.649718154.204.240.20080TCP
                2025-03-07T23:00:38.973306+010028554641A Network Trojan was detected192.168.2.649719154.204.240.20080TCP
                2025-03-07T23:00:41.504768+010028554641A Network Trojan was detected192.168.2.649720154.204.240.20080TCP
                2025-03-07T23:00:50.027594+010028554641A Network Trojan was detected192.168.2.649722178.128.48.2180TCP
                2025-03-07T23:00:52.571312+010028554641A Network Trojan was detected192.168.2.649723178.128.48.2180TCP
                2025-03-07T23:00:55.321830+010028554641A Network Trojan was detected192.168.2.649724178.128.48.2180TCP
                2025-03-07T23:01:03.401948+010028554641A Network Trojan was detected192.168.2.649726217.160.0.9080TCP
                2025-03-07T23:01:05.979674+010028554641A Network Trojan was detected192.168.2.649727217.160.0.9080TCP
                2025-03-07T23:01:08.555967+010028554641A Network Trojan was detected192.168.2.649728217.160.0.9080TCP
                2025-03-07T23:01:16.813632+010028554641A Network Trojan was detected192.168.2.649730104.21.32.180TCP
                2025-03-07T23:01:19.384829+010028554641A Network Trojan was detected192.168.2.649731104.21.32.180TCP
                2025-03-07T23:01:21.918663+010028554641A Network Trojan was detected192.168.2.649732104.21.32.180TCP
                2025-03-07T23:01:30.023780+010028554641A Network Trojan was detected192.168.2.64973413.248.169.4880TCP
                2025-03-07T23:01:32.582092+010028554641A Network Trojan was detected192.168.2.64973513.248.169.4880TCP
                2025-03-07T23:01:35.163774+010028554641A Network Trojan was detected192.168.2.64973613.248.169.4880TCP
                2025-03-07T23:01:43.307105+010028554641A Network Trojan was detected192.168.2.64973884.32.84.3280TCP
                2025-03-07T23:01:45.885267+010028554641A Network Trojan was detected192.168.2.64973984.32.84.3280TCP
                2025-03-07T23:01:48.463965+010028554641A Network Trojan was detected192.168.2.64974084.32.84.3280TCP
                2025-03-07T23:01:57.674047+010028554641A Network Trojan was detected192.168.2.64974247.83.1.9080TCP
                2025-03-07T23:02:00.432194+010028554641A Network Trojan was detected192.168.2.64974347.83.1.9080TCP
                2025-03-07T23:02:02.979168+010028554641A Network Trojan was detected192.168.2.64974447.83.1.9080TCP
                2025-03-07T23:02:12.072351+010028554641A Network Trojan was detected192.168.2.649746174.136.53.21880TCP
                2025-03-07T23:02:14.618521+010028554641A Network Trojan was detected192.168.2.649747174.136.53.21880TCP
                2025-03-07T23:02:17.176322+010028554641A Network Trojan was detected192.168.2.649748174.136.53.21880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: MmF9tcIj1J.exeAvira: detected
                Source: http://www.sigaque.today/wdz1/?56e87=VDD8OJ4H&CjuXKjB=a6zPArAcs68qsFGtTabzjyCobuMFh5AYI73tX7gtoPhGMe+Sl7/r92yDmXcH3BaZwyNUFPurN2KphsWf6vvA6fvZUSnh3QpL9dKDFXQtxsl2/KHzlz9zut+LhsKtEL2uwL2KJOU=Avira URL Cloud: Label: malware
                Source: http://www.dangky88kfree.online/tg7i/?CjuXKjB=W2lXFIPTRr4gesb5cwI0krzgLd36/9TbdyzTPi7nE0Z5NBEW+2FqYkNVo2Q4JiMVFhBrIV5cFAVL+yjFEQTGcK1oj27Lp27mt6TrOGKKvTfWhv2gr//jTvVuirH6o25Z8PLwJAA=&56e87=VDD8OJ4HAvira URL Cloud: Label: malware
                Source: http://www.j8g5rjpc.top/0n2g/Avira URL Cloud: Label: malware
                Source: http://www.corellia.pro/b6lp/Avira URL Cloud: Label: malware
                Source: http://www.dangky88kfree.online/tg7i/Avira URL Cloud: Label: malware
                Source: http://www.j8g5rjpc.top/0n2g/?CjuXKjB=fvZ7+iIC/TOHFCeFeBmLTEXsD3edtPY9OBxgr9LtykBa/CvCN5KBqrWYP+FQ6Pf4ssQMikZiOSwwxUN4REJawbXZhtEcjvnJZjvhmlYUu221S6iTRVzTzmyIZ7TjgG/a+0slBoM=&56e87=VDD8OJ4HAvira URL Cloud: Label: malware
                Source: http://www.corellia.pro/b6lp/?56e87=VDD8OJ4H&CjuXKjB=arOSZ/aZjFOIvQRY69DNNyuUiv5jjem2um+eBhx+733JBm31j6JLJ59OPZhYdXyw/lnqiSNjCITdwDNb+lYg7rfogT0dpOyAKgcolLV+bUO+gWL3ZF8aP7y1kiXIU6MqOXeLcBc=Avira URL Cloud: Label: malware
                Source: http://www.bjogo.top/p72h/?CjuXKjB=JBoasVqKMP/Tm9QoX+fzNGnUmdUkCFWsb5GUbFkhjKP5vsoVxEayp9YB9sG2XQZlNTDSgP5Ox1enp0SBoNbp1launwo2DlaU759DgYflM8WUARfDZqc4yZ8IOO3CnY+8e5nydM4=&56e87=VDD8OJ4HAvira URL Cloud: Label: malware
                Source: http://www.bjogo.top/p72h/Avira URL Cloud: Label: malware
                Source: MmF9tcIj1J.exeReversingLabs: Detection: 76%
                Source: MmF9tcIj1J.exeVirustotal: Detection: 70%Perma Link
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3692877173.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3695080703.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3690653132.0000000000A50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3692941025.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1508811235.00000000017E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3692821369.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1506820467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509021015.0000000002D20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: MmF9tcIj1J.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: MmF9tcIj1J.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: NEOn.pdb source: MmF9tcIj1J.exe
                Source: Binary string: mshta.pdbGCTL source: MmF9tcIj1J.exe, 00000004.00000002.1507065834.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3691897348.000000000086E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: MmF9tcIj1J.exe, 00000004.00000002.1507208063.0000000001440000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, 00000009.00000003.1507163146.000000000308A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, 00000009.00000003.1509681517.0000000003248000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.000000000358E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: NEOn.pdbSHA256 source: MmF9tcIj1J.exe
                Source: Binary string: wntdll.pdb source: MmF9tcIj1J.exe, MmF9tcIj1J.exe, 00000004.00000002.1507208063.0000000001440000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, mshta.exe, 00000009.00000003.1507163146.000000000308A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, 00000009.00000003.1509681517.0000000003248000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.000000000358E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: mshta.pdb source: MmF9tcIj1J.exe, 00000004.00000002.1507065834.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3691897348.000000000086E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: lq9nGfkZ7JbZdUv7.exe, 00000008.00000000.1429101175.00000000002DF000.00000002.00000001.01000000.0000000A.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3690719075.00000000002DF000.00000002.00000001.01000000.0000000A.sdmp
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A6C620 FindFirstFileW,FindNextFileW,FindClose,9_2_00A6C620
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 4x nop then xor eax, eax9_2_00A59F40
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 4x nop then mov ebx, 00000004h9_2_037F04CE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49701 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49714 -> 104.21.87.37:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49691 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49698 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49717 -> 104.21.87.37:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49702 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49708 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49697 -> 162.0.225.218:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49720 -> 154.204.240.200:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49700 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49727 -> 217.160.0.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49742 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49690 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49728 -> 217.160.0.90:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49745 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49741 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49695 -> 162.0.225.218:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49688 -> 104.21.48.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49706 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49726 -> 217.160.0.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49719 -> 154.204.240.200:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49692 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49703 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49721 -> 154.204.240.200:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49732 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49744 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49730 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49715 -> 104.21.87.37:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49694 -> 162.0.225.218:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49696 -> 162.0.225.218:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49749 -> 174.136.53.218:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49705 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49743 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49704 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49709 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49725 -> 178.128.48.21:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49716 -> 104.21.87.37:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49693 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49712 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49736 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49722 -> 178.128.48.21:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49739 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49710 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49707 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49711 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49718 -> 154.204.240.200:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49699 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49729 -> 217.160.0.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49731 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49748 -> 174.136.53.218:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49746 -> 174.136.53.218:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49738 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49733 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49724 -> 178.128.48.21:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49735 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49723 -> 178.128.48.21:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49740 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49737 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49747 -> 174.136.53.218:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49713 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49734 -> 13.248.169.48:80
                Source: DNS query: www.nullus.xyz
                Source: DNS query: www.corsix.xyz
                Source: DNS query: www.iquery.xyz
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 154.204.240.200 154.204.240.200
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKAccept-Ranges: bytesBpx-Id: 1741384849852158923-657-82628-47-0Content-Encoding: gzipContent-Length: 616Content-Type: text/htmlDate: Fri, 07 Mar 2025 22:00:39 GMTEtag: "80dd84e38ea6d51:0"Last-Modified: Fri, 29 Nov 2019 08:27:51 GMTServer: borderproxyVary: Accept-EncodingX-Powered-By: ASP.NETConnection: closeData Raw: 1f 8b 08 00 00 00 00 00 04 00 ed bd 07 60 1c 49 96 25 26 2f 6d ca 7b 7f 4a f5 4a d7 e0 74 a1 08 80 60 13 24 d8 90 40 10 ec c1 88 cd e6 92 ec 1d 69 47 23 29 ab 2a 81 ca 65 56 65 5d 66 16 40 cc ed 9d bc f7 de 7b ef bd f7 de 7b ef bd f7 ba 3b 9d 4e 27 f7 df ff 3f 5c 66 64 01 6c f6 ce 4a da c9 9e 21 80 aa c8 1f 3f 7e 7c 1f 3f 22 1e ff ae b3 6a da 5e af f2 74 de 2e ca a3 e4 31 7e a4 65 b6 bc f8 ec a3 7c f9 11 3e c8 b3 d9 51 92 d2 f3 78 91 b7 59 3a 9d 67 75 93 b7 9f 7d b4 6e cf b7 0f a8 05 7d 93 3e 6e 8b b6 cc 8f 5e 66 17 79 fa a2 6a d3 67 d5 7a 39 7b 7c 57 3e 95 16 fc f2 32 5b e4 9f 7d 74 59 e4 57 ab aa 6e 3f 4a a7 d5 b2 cd 97 04 ec aa 98 b5 f3 cf 66 f9 65 31 cd b7 f9 8f 51 5a 2c 8b b6 c8 ca ed 66 9a 95 f9 67 bb a6 ab a6 bd 06 50 fe 03 cf b7 d2 5f 6c 7f c7 53 16 cb 7c 7b 9e 17 17 f3 f6 51 ba 3b de 3b 0c be 5d 64 f5 45 b1 7c 94 ee b8 8f 7f 89 83 c5 a3 0f c1 4d ab b2 aa 1f a5 3f 7e 70 70 e0 5e c1 33 2b 9a 55 99 5d 3f 4a db 6c 52 e6 e1 77 e7 34 ae ed f3 6c 51 94 f4 7d 93 2d 9b ed 26 af 8b f3 b0 91 c5 71 67 e7 77 0f bf 69 f3 77 ed 76 56 16 17 84 e8 94 e8 93 d7 e1 f7 4c a0 ee 8b de 30 26 d5 ec ba 33 8c 10 db ed 69 5e 96 ee 55 3c 97 79 dd 16 44 69 d3 ef a2 98 cd ba c3 32 c4 db cb 17 69 b6 6e 2b f7 ad d7 f9 7c b7 d3 b5 a1 e0 fd fb f7 dd 0b 78 98 4a 4d f1 83 9c 21 46 be bb 52 0a ed ef c4 a7 6b d5 e9 c9 e0 b7 d3 c1 0e 8f d2 6c ef 60 67 f5 ce 7d e3 01 fb 3d 17 f9 ac c8 d2 6a 59 5e a7 cd b4 ce f3 65 9a 2d 67 e9 d6 22 7b 27 1c a9 2f df a1 4e ed 4b 78 40 ed 51 0f 17 3c fa da c3 fb de 34 e1 f1 7a c5 d3 a3 18 1e 26 80 10 67 77 7c bf 4b 1e 3c 6e b4 f4 df f8 5e b7 89 d7 89 fe fa f8 ae ca ce e3 bb 22 d5 8f 81 ba 8a d5 7c b7 27 be f4 91 7c b7 3a 7a 5d d5 35 0d 72 b2 6e d3 76 9e a7 2b b4 bc ae d6 e9 55 5e e7 69 5b 5f 17 cb 8b b4 ad 52 48 76 3a ab f2 26 5d 12 98 fc 5d d1 b4 e3 c7 77 57 d4 d3 5d e9 8a 80 92 88 1d fd 3f 6f df f5 19 77 04 00 00 Data Ascii: `I%&/m{JJt`$@iG#)*eVe]f@{{;N'?\fdlJ!?~|?"j^t.1~e|>QxY:gu}n}>n^fyjgz9{|W>2[}tYWn?Jfe1QZ,fgP_lS|{Q;;]dE|M?~pp^3+U]?JlRw4lQ}-&qgwiwvVL0&3i^U<yDi2in+|xJM!FRkl`g}=jY^e-g"{'/NKx@Q<4z&gw|K<n^"|'|:z]5rnv+U^i[_RHv:&]]wW]?ow
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKAccept-Ranges: bytesBpx-Id: 1741384852401263042-657-82628-47-0Content-Encoding: gzipContent-Length: 616Content-Type: text/htmlDate: Fri, 07 Mar 2025 22:00:42 GMTEtag: "80dd84e38ea6d51:0"Last-Modified: Fri, 29 Nov 2019 08:27:51 GMTServer: borderproxyVary: Accept-EncodingX-Powered-By: ASP.NETConnection: closeData Raw: 1f 8b 08 00 00 00 00 00 04 00 ed bd 07 60 1c 49 96 25 26 2f 6d ca 7b 7f 4a f5 4a d7 e0 74 a1 08 80 60 13 24 d8 90 40 10 ec c1 88 cd e6 92 ec 1d 69 47 23 29 ab 2a 81 ca 65 56 65 5d 66 16 40 cc ed 9d bc f7 de 7b ef bd f7 de 7b ef bd f7 ba 3b 9d 4e 27 f7 df ff 3f 5c 66 64 01 6c f6 ce 4a da c9 9e 21 80 aa c8 1f 3f 7e 7c 1f 3f 22 1e ff ae b3 6a da 5e af f2 74 de 2e ca a3 e4 31 7e a4 65 b6 bc f8 ec a3 7c f9 11 3e c8 b3 d9 51 92 d2 f3 78 91 b7 59 3a 9d 67 75 93 b7 9f 7d b4 6e cf b7 0f a8 05 7d 93 3e 6e 8b b6 cc 8f 5e 66 17 79 fa a2 6a d3 67 d5 7a 39 7b 7c 57 3e 95 16 fc f2 32 5b e4 9f 7d 74 59 e4 57 ab aa 6e 3f 4a a7 d5 b2 cd 97 04 ec aa 98 b5 f3 cf 66 f9 65 31 cd b7 f9 8f 51 5a 2c 8b b6 c8 ca ed 66 9a 95 f9 67 bb a6 ab a6 bd 06 50 fe 03 cf b7 d2 5f 6c 7f c7 53 16 cb 7c 7b 9e 17 17 f3 f6 51 ba 3b de 3b 0c be 5d 64 f5 45 b1 7c 94 ee b8 8f 7f 89 83 c5 a3 0f c1 4d ab b2 aa 1f a5 3f 7e 70 70 e0 5e c1 33 2b 9a 55 99 5d 3f 4a db 6c 52 e6 e1 77 e7 34 ae ed f3 6c 51 94 f4 7d 93 2d 9b ed 26 af 8b f3 b0 91 c5 71 67 e7 77 0f bf 69 f3 77 ed 76 56 16 17 84 e8 94 e8 93 d7 e1 f7 4c a0 ee 8b de 30 26 d5 ec ba 33 8c 10 db ed 69 5e 96 ee 55 3c 97 79 dd 16 44 69 d3 ef a2 98 cd ba c3 32 c4 db cb 17 69 b6 6e 2b f7 ad d7 f9 7c b7 d3 b5 a1 e0 fd fb f7 dd 0b 78 98 4a 4d f1 83 9c 21 46 be bb 52 0a ed ef c4 a7 6b d5 e9 c9 e0 b7 d3 c1 0e 8f d2 6c ef 60 67 f5 ce 7d e3 01 fb 3d 17 f9 ac c8 d2 6a 59 5e a7 cd b4 ce f3 65 9a 2d 67 e9 d6 22 7b 27 1c a9 2f df a1 4e ed 4b 78 40 ed 51 0f 17 3c fa da c3 fb de 34 e1 f1 7a c5 d3 a3 18 1e 26 80 10 67 77 7c bf 4b 1e 3c 6e b4 f4 df f8 5e b7 89 d7 89 fe fa f8 ae ca ce e3 bb 22 d5 8f 81 ba 8a d5 7c b7 27 be f4 91 7c b7 3a 7a 5d d5 35 0d 72 b2 6e d3 76 9e a7 2b b4 bc ae d6 e9 55 5e e7 69 5b 5f 17 cb 8b b4 ad 52 48 76 3a ab f2 26 5d 12 98 fc 5d d1 b4 e3 c7 77 57 d4 d3 5d e9 8a 80 92 88 1d fd 3f 6f df f5 19 77 04 00 00 Data Ascii: `I%&/m{JJt`$@iG#)*eVe]f@{{;N'?\fdlJ!?~|?"j^t.1~e|>QxY:gu}n}>n^fyjgz9{|W>2[}tYWn?Jfe1QZ,fgP_lS|{Q;;]dE|M?~pp^3+U]?JlRw4lQ}-&qgwiwvVL0&3i^U<yDi2in+|xJM!FRkl`g}=jY^e-g"{'/NKx@Q<4z&gw|K<n^"|'|:z]5rnv+U^i[_RHv:&]]wW]?ow
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKAccept-Ranges: bytesBpx-Id: 1741384854976856865-657-82628-47-0Content-Encoding: gzipContent-Length: 616Content-Type: text/htmlDate: Fri, 07 Mar 2025 22:00:44 GMTEtag: "80dd84e38ea6d51:0"Last-Modified: Fri, 29 Nov 2019 08:27:51 GMTServer: borderproxyVary: Accept-EncodingX-Powered-By: ASP.NETConnection: closeData Raw: 1f 8b 08 00 00 00 00 00 04 00 ed bd 07 60 1c 49 96 25 26 2f 6d ca 7b 7f 4a f5 4a d7 e0 74 a1 08 80 60 13 24 d8 90 40 10 ec c1 88 cd e6 92 ec 1d 69 47 23 29 ab 2a 81 ca 65 56 65 5d 66 16 40 cc ed 9d bc f7 de 7b ef bd f7 de 7b ef bd f7 ba 3b 9d 4e 27 f7 df ff 3f 5c 66 64 01 6c f6 ce 4a da c9 9e 21 80 aa c8 1f 3f 7e 7c 1f 3f 22 1e ff ae b3 6a da 5e af f2 74 de 2e ca a3 e4 31 7e a4 65 b6 bc f8 ec a3 7c f9 11 3e c8 b3 d9 51 92 d2 f3 78 91 b7 59 3a 9d 67 75 93 b7 9f 7d b4 6e cf b7 0f a8 05 7d 93 3e 6e 8b b6 cc 8f 5e 66 17 79 fa a2 6a d3 67 d5 7a 39 7b 7c 57 3e 95 16 fc f2 32 5b e4 9f 7d 74 59 e4 57 ab aa 6e 3f 4a a7 d5 b2 cd 97 04 ec aa 98 b5 f3 cf 66 f9 65 31 cd b7 f9 8f 51 5a 2c 8b b6 c8 ca ed 66 9a 95 f9 67 bb a6 ab a6 bd 06 50 fe 03 cf b7 d2 5f 6c 7f c7 53 16 cb 7c 7b 9e 17 17 f3 f6 51 ba 3b de 3b 0c be 5d 64 f5 45 b1 7c 94 ee b8 8f 7f 89 83 c5 a3 0f c1 4d ab b2 aa 1f a5 3f 7e 70 70 e0 5e c1 33 2b 9a 55 99 5d 3f 4a db 6c 52 e6 e1 77 e7 34 ae ed f3 6c 51 94 f4 7d 93 2d 9b ed 26 af 8b f3 b0 91 c5 71 67 e7 77 0f bf 69 f3 77 ed 76 56 16 17 84 e8 94 e8 93 d7 e1 f7 4c a0 ee 8b de 30 26 d5 ec ba 33 8c 10 db ed 69 5e 96 ee 55 3c 97 79 dd 16 44 69 d3 ef a2 98 cd ba c3 32 c4 db cb 17 69 b6 6e 2b f7 ad d7 f9 7c b7 d3 b5 a1 e0 fd fb f7 dd 0b 78 98 4a 4d f1 83 9c 21 46 be bb 52 0a ed ef c4 a7 6b d5 e9 c9 e0 b7 d3 c1 0e 8f d2 6c ef 60 67 f5 ce 7d e3 01 fb 3d 17 f9 ac c8 d2 6a 59 5e a7 cd b4 ce f3 65 9a 2d 67 e9 d6 22 7b 27 1c a9 2f df a1 4e ed 4b 78 40 ed 51 0f 17 3c fa da c3 fb de 34 e1 f1 7a c5 d3 a3 18 1e 26 80 10 67 77 7c bf 4b 1e 3c 6e b4 f4 df f8 5e b7 89 d7 89 fe fa f8 ae ca ce e3 bb 22 d5 8f 81 ba 8a d5 7c b7 27 be f4 91 7c b7 3a 7a 5d d5 35 0d 72 b2 6e d3 76 9e a7 2b b4 bc ae d6 e9 55 5e e7 69 5b 5f 17 cb 8b b4 ad 52 48 76 3a ab f2 26 5d 12 98 fc 5d d1 b4 e3 c7 77 57 d4 d3 5d e9 8a 80 92 88 1d fd 3f 6f df f5 19 77 04 00 00 Data Ascii: `I%&/m{JJt`$@iG#)*eVe]f@{{;N'?\fdlJ!?~|?"j^t.1~e|>QxY:gu}n}>n^fyjgz9{|W>2[}tYWn?Jfe1QZ,fgP_lS|{Q;;]dE|M?~pp^3+U]?JlRw4lQ}-&qgwiwvVL0&3i^U<yDi2in+|xJM!FRkl`g}=jY^e-g"{'/NKx@Q<4z&gw|K<n^"|'|:z]5rnv+U^i[_RHv:&]]wW]?ow
                Source: global trafficHTTP traffic detected: GET /wdz1/?56e87=VDD8OJ4H&CjuXKjB=a6zPArAcs68qsFGtTabzjyCobuMFh5AYI73tX7gtoPhGMe+Sl7/r92yDmXcH3BaZwyNUFPurN2KphsWf6vvA6fvZUSnh3QpL9dKDFXQtxsl2/KHzlz9zut+LhsKtEL2uwL2KJOU= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.sigaque.todayUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /y53x/?CjuXKjB=cWswSZ7aAp39sdbsXGpuMMMt6/LJxIwKTa77z9r2je/R8wToat4sLl9UjfzaI1DjumgV6JrtanxkqUlrlKUlt0UAUIvQZNE5jku/6hcokxcXJ9kJUPI1/76KAS44PRXUsV5W8mw=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.nullus.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /gdgz/?CjuXKjB=50Eo+msjPTmNUMxLWGXNaz1nFocCQ8nxM05nGxnVo3BrR895ogfIkjGz36VyZvQOtFEwQIJ3T4aIkZIC5BPLf/rPYAmESkb+wnrJPQ4l4mh7FCrlZI5BK7u424OCCIVxsULVgD0=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.innonow.websiteUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /tg7i/?CjuXKjB=W2lXFIPTRr4gesb5cwI0krzgLd36/9TbdyzTPi7nE0Z5NBEW+2FqYkNVo2Q4JiMVFhBrIV5cFAVL+yjFEQTGcK1oj27Lp27mt6TrOGKKvTfWhv2gr//jTvVuirH6o25Z8PLwJAA=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.dangky88kfree.onlineUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /iif1/?CjuXKjB=klM6TdPPz68Qx1ZvAld+VtgNPFdZa/BGoL0cQlE+3VAfrj7achUTu3KL8ieMqkSdt6978kPg0kIQ4tHFfwFwVTqYF76bAi/NyVxsiZnxPA9igYE2IIENW1bg6TEHAuGn10MLWR0=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.goodparents.netUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /mlxj/?CjuXKjB=RVQtV5Q1ZJvg3YjHwjyEAPKjZoJ2KRe/Amx3hxV3ESE0t+tivGZBcDdBTtP7FcndEQ+IiopfuiJ6f3Unh+B+gSFSRnKofjdEd07+Gzh0IfXrPmZB8I+UZ0Wx+xMoYJ6BmJESvVI=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.corsix.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /fowj/?56e87=VDD8OJ4H&CjuXKjB=5sXdoS8n4C3E6/rguliEdK39o6eQOzkylfRlt2No+gnm2EdwP7YqbswwmdG7xOEtLQJjdyw/1NREyw/KjgaFKxN3jNHd0X0QLn30FsNoioE/elM5lQNmh0J1JMvKt8pM0v5hF9A= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.fjlgyc.infoUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /p72h/?CjuXKjB=JBoasVqKMP/Tm9QoX+fzNGnUmdUkCFWsb5GUbFkhjKP5vsoVxEayp9YB9sG2XQZlNTDSgP5Ox1enp0SBoNbp1launwo2DlaU759DgYflM8WUARfDZqc4yZ8IOO3CnY+8e5nydM4=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.bjogo.topUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /0n2g/?CjuXKjB=fvZ7+iIC/TOHFCeFeBmLTEXsD3edtPY9OBxgr9LtykBa/CvCN5KBqrWYP+FQ6Pf4ssQMikZiOSwwxUN4REJawbXZhtEcjvnJZjvhmlYUu221S6iTRVzTzmyIZ7TjgG/a+0slBoM=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.j8g5rjpc.topUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /q9z3/?CjuXKjB=6c2q/ZaRCojWtSDUcFJaeSuS2BTYhBVfnju0A/12YyB1KLUbQAPCNSUudSPB9fQ66/9RirTsfxpMYqMehyH8ZO8kGkGnQ0Y5J6LDCAkZFl55Zs8XdgXc3cXy6zzfc0r1Ct2IQNk=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.mamiofficial.clickUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /b6lp/?56e87=VDD8OJ4H&CjuXKjB=arOSZ/aZjFOIvQRY69DNNyuUiv5jjem2um+eBhx+733JBm31j6JLJ59OPZhYdXyw/lnqiSNjCITdwDNb+lYg7rfogT0dpOyAKgcolLV+bUO+gWL3ZF8aP7y1kiXIU6MqOXeLcBc= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.corellia.proUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /lqfq/?CjuXKjB=wVuWj6gbMVyL7sYNE4rzfjuNAQrl0Rjcu4wDZtceGg1vVt/9QQhmvnxl/mnGRhFfs7QMEr17nlh/JXtPuAN65VZt3pTRX/DsQz+cEXx78FrEkXpg6Un/GdIYe46sRS7bsvJoShg=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.newanthoperso.shopUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /lz2d/?CjuXKjB=opnwfoEXagE4Vi0oQoyzv9KQZj5ON4gkmp1/l3SJnZ7Dz4RLF9x8L0AYDkJWUBNclOZ54PoxRZ0rsNxBrA9sqdGzXb1nEuZspURWvpXhvmzZe8G2VroAgr8kf7nP1UmdC+ym8p4=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.iquery.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /ifpv/?CjuXKjB=HncMFlglP6BvH5EZgZU2oChwshoIBBmJLVytKzJt2/sW7+iT80TqqFDetVY/7D0w9Gd6WvxE3pww0bWyITp0v5BqGAzmojfD4vw55tVIRTGMIEvQUtOd0oSRXrVxgwqLCITsywY=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.luittard-le-mode.shopUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /w5wx/?CjuXKjB=TYpBuhpwnP9LeBAfIIQHi4b8MaE92Ht78YPwdNoW7rLxpWx/PnPfwnRiO6yU1FmY7NNamMRjNjI1P9VPL8UQ2N3gC6vL/3tJxyZzY/rQDMd0vT9Yt7DW3kKy3w72k9uwKcUWUpI=&56e87=VDD8OJ4H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.btbjpu.infoUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36
                Source: lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: Content-Security-Policy: upgrade-insecure-requests; default-src data: 'unsafe-inline' 'unsafe-eval' https:; script-src data: 'unsafe-inline' 'unsafe-eval' https: blob: https://www.googleanalytics.com https://www.google-analytics.com https://www.googleoptimize.com https://optimize.google.com https://td.doubleclick.net https://fburl.com https://www.facebook.com https://connect.facebook.net; style-src data: 'unsafe-inline' https: https://optimize.google.com https://fonts.googleapis.com https://w.ladicdn.com https://s.ladicdn.com; img-src data: https: blob: android-webview-video-poster: https://www.google-analytics.com https://www.googletagmanager.com https://optimize.google.com https://w.ladicdn.com https://s.ladicdn.com; font-src data: https: https://fonts.gstatic.com https://w.ladicdn.com https://s.ladicdn.com; connect-src https: wss: blob:; media-src data: https: blob:; object-src https:; child-src https: data: blob:; form-action https:; frame-ancestors https://popupx.ladi.me https://*.ladi.me https://s.ladicdn.com https://g.ladicdn.com https://w.ladicdn.com https://*.ladicdn.com https://www.facebook.com https://*.facebook.com equals www.facebook.com (Facebook)
                Source: global trafficDNS traffic detected: DNS query: www.sigaque.today
                Source: global trafficDNS traffic detected: DNS query: www.nullus.xyz
                Source: global trafficDNS traffic detected: DNS query: www.innonow.website
                Source: global trafficDNS traffic detected: DNS query: www.dangky88kfree.online
                Source: global trafficDNS traffic detected: DNS query: www.goodparents.net
                Source: global trafficDNS traffic detected: DNS query: www.corsix.xyz
                Source: global trafficDNS traffic detected: DNS query: www.fjlgyc.info
                Source: global trafficDNS traffic detected: DNS query: www.bjogo.top
                Source: global trafficDNS traffic detected: DNS query: www.j8g5rjpc.top
                Source: global trafficDNS traffic detected: DNS query: www.mamiofficial.click
                Source: global trafficDNS traffic detected: DNS query: www.corellia.pro
                Source: global trafficDNS traffic detected: DNS query: www.newanthoperso.shop
                Source: global trafficDNS traffic detected: DNS query: www.iquery.xyz
                Source: global trafficDNS traffic detected: DNS query: www.luittard-le-mode.shop
                Source: global trafficDNS traffic detected: DNS query: www.btbjpu.info
                Source: global trafficDNS traffic detected: DNS query: www.maceoconsultores.net
                Source: unknownHTTP traffic detected: POST /y53x/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cache-Control: no-cacheContent-Type: application/x-www-form-urlencodedConnection: closeContent-Length: 212Host: www.nullus.xyzOrigin: http://www.nullus.xyzReferer: http://www.nullus.xyz/y53x/User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; XT907 Build/KDA20.62-15) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Mobile Safari/537.36Data Raw: 43 6a 75 58 4b 6a 42 3d 52 55 45 51 52 75 6a 50 41 36 76 56 39 76 4c 73 54 6c 30 72 50 5a 30 41 37 65 72 4b 77 6f 4e 2b 51 4c 79 39 78 6f 50 66 73 4f 2f 59 36 56 4b 4e 62 4b 41 45 4d 45 42 69 76 2f 65 47 42 47 76 42 6a 69 51 58 37 5a 48 42 64 58 42 7a 6f 6b 56 77 70 66 59 49 36 56 45 4a 51 2b 48 44 42 63 73 4b 68 6e 37 74 2f 30 5a 61 6e 54 4e 68 4a 4f 73 66 53 72 6b 42 7a 6f 79 4e 57 51 55 32 66 44 66 6e 78 79 52 65 6d 6a 7a 4c 65 73 31 45 79 5a 4b 65 66 68 78 6c 44 6d 73 42 35 54 62 43 69 30 59 44 2b 51 46 42 6c 70 44 31 77 78 6f 77 32 44 73 62 6a 55 41 68 74 69 2b 67 53 67 55 31 6b 75 42 65 55 51 43 6e 49 43 54 52 73 6b 63 75 Data Ascii: CjuXKjB=RUEQRujPA6vV9vLsTl0rPZ0A7erKwoN+QLy9xoPfsO/Y6VKNbKAEMEBiv/eGBGvBjiQX7ZHBdXBzokVwpfYI6VEJQ+HDBcsKhn7t/0ZanTNhJOsfSrkBzoyNWQU2fDfnxyRemjzLes1EyZKefhxlDmsB5TbCi0YD+QFBlpD1wxow2DsbjUAhti+gSgU1kuBeUQCnICTRskcu
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:58:44 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vT5JsXLd4zNN1AzX19paVJURCokRe10v%2BED2Ays6E6VFN3s7i%2B8ay784qpvnTDYYVGgBiVebnrox%2FAQrVyi7y7bGohJaFQbMk0Bh%2Fxqel%2Fp7%2FMdapsGG0i%2Bu0wT825QSoaaCSg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5b1b59d98c15-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1935&min_rtt=1935&rtt_var=967&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=519&delivery_rate=0&cwnd=216&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 32 62 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 Data Ascii: 22b<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.20.1</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!--
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:59:12 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:59:15 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:59:18 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:59:20 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:00:11 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:00:22 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a7jreK%2FqIYHq2ovuvfUPePHZDNHGTBbTYh8JFHxaBhei7YhuRslnvmoyUXV0up0Swj%2Fk0qHgohdgTttSvmneXcrxFYeIRSRbGuuFNJxee4DQzpJx1cSRMhxfmIHjf03V"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5d819ce73350-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1906&min_rtt=1906&rtt_var=953&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=766&delivery_rate=0&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:00:24 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qEqGcWGcl%2BD4kU5ulIIqafxLHBzLp5teXW3rqTeEXkrP%2FmGcPx3BCWztPNC%2BaxSEVasaF94Vm0cVyeOmLUI4EiST0tBYzqwwbEapRSAAn72uu8j0DHTOytQjiTBXySXk"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5d91bc1ed96d-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2046&min_rtt=2046&rtt_var=1023&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=790&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:00:27 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4LqeIE2122LwoRuK0hVtI1ddSOhKgA%2ByUxHIR%2FN%2FfhSLCdQzVy1kk0783qURk0gMHJjOJRFFhrRRbCm8Vb%2Fh4BCR2nUXhOcYIhFCYv58ERl7AfB9AzPoS1366Tcej41D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5da19b217cb2-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1970&min_rtt=1970&rtt_var=985&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=950&delivery_rate=0&cwnd=221&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:00:29 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TL8YQtlgJ01XlpG3A0VQCv9Tx%2FN%2FpNX7CKNDsa6205Vbb%2FZzq6643EBQ2U14SWE9STqaamLdqtdC%2BLMbYrCG8Wfw0lCP%2BYC8%2Ftgv2duSV9YL4ZCO31ob6sBHXYi9mdR0"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5db22b8542be-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1746&min_rtt=1746&rtt_var=873&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=515&delivery_rate=0&cwnd=180&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 32 34 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c Data Ascii: 224<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendl
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Fri, 07 Mar 2025 22:01:03 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 65 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 52 4b 8f d3 30 10 be f7 57 0c 41 a2 17 12 b7 74 0f 7d 24 7b a0 ad c4 4a 65 59 41 78 1d 8d 33 6d 2c 39 b6 6b 8f fb d8 5f 8f 93 6e 0a 8b 56 9c 3c b6 be d7 78 26 7f b5 fa b4 2c 7f 3e ac a1 a6 46 c1 c3 d7 f7 9b bb 25 24 29 63 df 27 4b c6 56 e5 0a 7e 7c 28 3f 6e 60 9c 8d a0 74 5c 7b 49 d2 68 ae 18 5b df 27 83 a4 26 b2 73 c6 8e c7 63 76 9c 64 c6 ed 58 f9 99 9d 5a ad 71 4b 7e 2a 53 fa 8b 99 55 54 25 b7 83 bc 33 54 5c ef 8a 04 75 02 a7 46 cd 9f dd b4 2f 5e 90 1f cf 66 b3 8b 6a d4 80 bc 46 5e c5 13 72 92 a4 b0 ad 60 ed 9c 71 70 33 ba 81 14 ee 0d c1 d6 04 5d b5 10 76 c5 e4 0d 12 07 61 34 a1 a6 22 21 3c 11 6b e3 2c 40 d4 dc 79 a4 22 d0 36 9d 26 f1 53 c8 a6 b8 0f f2 50 24 cb 0b 3c 2d cf 16 5b 6f f8 47 45 9b 54 70 51 e3 73 56 f7 94 b6 56 ce a8 2e 32 7b ca 9c ff 32 d5 19 3c 9d 15 16 c9 36 02 d2 2d 6f a4 3a cf b9 93 5c 2d 2e 16 f5 b8 47 08 a3 8c 9b bf 1e f1 c9 bb a9 58 74 78 2f 1f 71 1e 07 83 cd 05 fd 9f d6 eb 71 97 d8 f6 6a 7f f8 a3 6c 7a e5 6f 10 b6 52 d4 12 1d b8 b6 6b 0f 7a c8 c1 72 0f 6f 90 8b 40 b8 a0 be 80 d8 4f 38 f4 b7 6c 70 a7 c0 62 20 f0 43 be 93 0e aa 61 d0 08 e8 1c 06 07 84 a2 d6 72 1f 30 83 6f 18 a4 52 f8 08 ae a7 a2 f7 fc 1c 0d 83 ba 6a 3b 19 59 d8 c4 d9 64 f0 45 c2 c1 84 18 04 c1 46 c3 c8 6c e3 70 21 7a 7e 15 b9 3c 5c 73 73 1b 95 77 8e 1f 70 e1 c1 aa e0 5b 2d 1f 23 68 e2 24 0f e8 df 82 40 c5 c1 cb 9d 96 5b 89 b0 0f 43 a9 80 bf d0 a1 0f d6 3a d9 f4 46 59 b7 43 36 fe 63 ce da d1 c5 15 ee 96 e6 76 f0 1b 11 e8 b3 c9 45 03 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 1ee}RK0WAt}${JeYAx3m,9k_nV<x&,>F%$)c'KV~|(?n`t\{Ih['&scvdXZqK~*SUT%3T\uF/^fjF^r`qp3]va4"!<k,@y"6&SP$<-[oGETpQsVV.2{2<6-o:\-.GXtx/qqjlzoRkzro@O8lpb Car0oRj;YdEFlp!z~<\sswp[-#h$@[C:FYC6cvE0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Fri, 07 Mar 2025 22:01:05 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 65 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 52 4b 8f d3 30 10 be f7 57 0c 41 a2 17 12 b7 74 0f 7d 24 7b a0 ad c4 4a 65 59 41 78 1d 8d 33 6d 2c 39 b6 6b 8f fb d8 5f 8f 93 6e 0a 8b 56 9c 3c b6 be d7 78 26 7f b5 fa b4 2c 7f 3e ac a1 a6 46 c1 c3 d7 f7 9b bb 25 24 29 63 df 27 4b c6 56 e5 0a 7e 7c 28 3f 6e 60 9c 8d a0 74 5c 7b 49 d2 68 ae 18 5b df 27 83 a4 26 b2 73 c6 8e c7 63 76 9c 64 c6 ed 58 f9 99 9d 5a ad 71 4b 7e 2a 53 fa 8b 99 55 54 25 b7 83 bc 33 54 5c ef 8a 04 75 02 a7 46 cd 9f dd b4 2f 5e 90 1f cf 66 b3 8b 6a d4 80 bc 46 5e c5 13 72 92 a4 b0 ad 60 ed 9c 71 70 33 ba 81 14 ee 0d c1 d6 04 5d b5 10 76 c5 e4 0d 12 07 61 34 a1 a6 22 21 3c 11 6b e3 2c 40 d4 dc 79 a4 22 d0 36 9d 26 f1 53 c8 a6 b8 0f f2 50 24 cb 0b 3c 2d cf 16 5b 6f f8 47 45 9b 54 70 51 e3 73 56 f7 94 b6 56 ce a8 2e 32 7b ca 9c ff 32 d5 19 3c 9d 15 16 c9 36 02 d2 2d 6f a4 3a cf b9 93 5c 2d 2e 16 f5 b8 47 08 a3 8c 9b bf 1e f1 c9 bb a9 58 74 78 2f 1f 71 1e 07 83 cd 05 fd 9f d6 eb 71 97 d8 f6 6a 7f f8 a3 6c 7a e5 6f 10 b6 52 d4 12 1d b8 b6 6b 0f 7a c8 c1 72 0f 6f 90 8b 40 b8 a0 be 80 d8 4f 38 f4 b7 6c 70 a7 c0 62 20 f0 43 be 93 0e aa 61 d0 08 e8 1c 06 07 84 a2 d6 72 1f 30 83 6f 18 a4 52 f8 08 ae a7 a2 f7 fc 1c 0d 83 ba 6a 3b 19 59 d8 c4 d9 64 f0 45 c2 c1 84 18 04 c1 46 c3 c8 6c e3 70 21 7a 7e 15 b9 3c 5c 73 73 1b 95 77 8e 1f 70 e1 c1 aa e0 5b 2d 1f 23 68 e2 24 0f e8 df 82 40 c5 c1 cb 9d 96 5b 89 b0 0f 43 a9 80 bf d0 a1 0f d6 3a d9 f4 46 59 b7 43 36 fe 63 ce da d1 c5 15 ee 96 e6 76 f0 1b 11 e8 b3 c9 45 03 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 1ee}RK0WAt}${JeYAx3m,9k_nV<x&,>F%$)c'KV~|(?n`t\{Ih['&scvdXZqK~*SUT%3T\uF/^fjF^r`qp3]va4"!<k,@y"6&SP$<-[oGETpQsVV.2{2<6-o:\-.GXtx/qqjlzoRkzro@O8lpb Car0oRj;YdEFlp!z~<\sswp[-#h$@[C:FYC6cvE0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Fri, 07 Mar 2025 22:01:08 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 65 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 52 4b 8f d3 30 10 be f7 57 0c 41 a2 17 12 b7 74 0f 7d 24 7b a0 ad c4 4a 65 59 41 78 1d 8d 33 6d 2c 39 b6 6b 8f fb d8 5f 8f 93 6e 0a 8b 56 9c 3c b6 be d7 78 26 7f b5 fa b4 2c 7f 3e ac a1 a6 46 c1 c3 d7 f7 9b bb 25 24 29 63 df 27 4b c6 56 e5 0a 7e 7c 28 3f 6e 60 9c 8d a0 74 5c 7b 49 d2 68 ae 18 5b df 27 83 a4 26 b2 73 c6 8e c7 63 76 9c 64 c6 ed 58 f9 99 9d 5a ad 71 4b 7e 2a 53 fa 8b 99 55 54 25 b7 83 bc 33 54 5c ef 8a 04 75 02 a7 46 cd 9f dd b4 2f 5e 90 1f cf 66 b3 8b 6a d4 80 bc 46 5e c5 13 72 92 a4 b0 ad 60 ed 9c 71 70 33 ba 81 14 ee 0d c1 d6 04 5d b5 10 76 c5 e4 0d 12 07 61 34 a1 a6 22 21 3c 11 6b e3 2c 40 d4 dc 79 a4 22 d0 36 9d 26 f1 53 c8 a6 b8 0f f2 50 24 cb 0b 3c 2d cf 16 5b 6f f8 47 45 9b 54 70 51 e3 73 56 f7 94 b6 56 ce a8 2e 32 7b ca 9c ff 32 d5 19 3c 9d 15 16 c9 36 02 d2 2d 6f a4 3a cf b9 93 5c 2d 2e 16 f5 b8 47 08 a3 8c 9b bf 1e f1 c9 bb a9 58 74 78 2f 1f 71 1e 07 83 cd 05 fd 9f d6 eb 71 97 d8 f6 6a 7f f8 a3 6c 7a e5 6f 10 b6 52 d4 12 1d b8 b6 6b 0f 7a c8 c1 72 0f 6f 90 8b 40 b8 a0 be 80 d8 4f 38 f4 b7 6c 70 a7 c0 62 20 f0 43 be 93 0e aa 61 d0 08 e8 1c 06 07 84 a2 d6 72 1f 30 83 6f 18 a4 52 f8 08 ae a7 a2 f7 fc 1c 0d 83 ba 6a 3b 19 59 d8 c4 d9 64 f0 45 c2 c1 84 18 04 c1 46 c3 c8 6c e3 70 21 7a 7e 15 b9 3c 5c 73 73 1b 95 77 8e 1f 70 e1 c1 aa e0 5b 2d 1f 23 68 e2 24 0f e8 df 82 40 c5 c1 cb 9d 96 5b 89 b0 0f 43 a9 80 bf d0 a1 0f d6 3a d9 f4 46 59 b7 43 36 fe 63 ce da d1 c5 15 ee 96 e6 76 f0 1b 11 e8 b3 c9 45 03 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 1ee}RK0WAt}${JeYAx3m,9k_nV<x&,>F%$)c'KV~|(?n`t\{Ih['&scvdXZqK~*SUT%3T\uF/^fjF^r`qp3]va4"!<k,@y"6&SP$<-[oGETpQsVV.2{2<6-o:\-.GXtx/qqjlzoRkzro@O8lpb Car0oRj;YdEFlp!z~<\sswp[-#h$@[C:FYC6cvE0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 837Connection: closeDate: Fri, 07 Mar 2025 22:01:11 GMTServer: ApacheData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 22 3e 0a 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 30 61 33 32 38 63 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 30 65 6d 3b 22 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 68 31 3e 0a 20 20 3c 70 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 30 2e 38 65 6d 3b 22 3e 0a 20 20 20 4c 65 20 66 69 63 68 69 65 72 20 72 65 71 75 69 73 20 6e 27 61 20 70 61 73 20 26 65 61 63 75 74 65 3b 74 26 65 61 63 75 74 65 3b 20 74 72 6f 75 76 26 65 61 63 75 74 65 3b 2e 0a 49 6c 20 70 65 75 74 20 73 27 61 67 69 72 20 64 27 75 6e 65 20 65 72 72 65 75 72 20 74 65 63 68 6e 69 71 75 65 2e 20 56 65 75 69 6c 6c 65 7a 20 72 26 65 61 63 75 74 65 3b 65 73 73 61 79 65 72 20 75 6c 74 26 65 61 63 75 74 65 3b 72 69 65 75 72 65 6d 65 6e 74 2e 20 53 69 20 76 6f 75 73 20 6e 65 20 70 6f 75 76 65 7a 20 70 61 73 20 61 63 63 26 65 61 63 75 74 65 3b 64 65 72 20 61 75 20 66 69 63 68 69 65 72 20 61 70 72 26 65 67 72 61 76 65 3b 73 20 70 6c 75 73 69 65 75 72 73 20 74 65 6e 74 61 74 69 76 65 73 2c 20 63 65 6c 61 20 73 69 67 6e 69 66 69 65 20 71 75 27 69 6c 20 61 20 26 65 61 63 75 74 65 3b 74 26 65 61 63 75 74 65 3b 20 73 75 70 70 72 69 6d 26 65 61 63 75 74 65 3b 2e 0a 20 20 3c 2f 70 3e 0a 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"> <head> <title> Error 404 - Not found </title> <meta content="text/html; charset=utf-8" http-equiv="Content-Type"> <meta c
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:01:16 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XjdX8gSw9%2FOotVpl86plnTVce65O44vrMjh1Pap1bpiha%2BSPS4xLPadK276%2FXZlm8%2B%2B4E%2Bvy136qTOV5IS4cSAjKGZ8ru3pVvgBNHwfASPJnEKa3pE3GOx5gv0%2F24w28F5JXCU0uhBWx"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5ed6cba272b9-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1764&min_rtt=1764&rtt_var=882&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=793&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 38 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b 03 31 14 84 ef f9 15 cf de dd b7 95 1e 3c 3c 02 da dd 62 61 ad 8b a6 07 8f d1 bc 92 42 9b c4 e4 d5 e0 bf 97 dd 22 78 9d f9 66 98 a1 9b ee 65 6d de c7 1e 9e cc f3 00 e3 fe 71 d8 ae 61 71 8b b8 ed cd 06 b1 33 dd d5 b9 6b 5a c4 7e b7 d0 8a bc 9c 4f 9a 3c 5b a7 15 c9 51 4e ac 57 ed 0a 76 51 60 13 2f c1 11 5e 45 45 38 43 f4 11 dd cf 94 5b ea 7f 8c 5f 6a 45 49 1b cf 90 f9 eb c2 45 d8 c1 fe 75 80 6a 0b 84 28 70 98 38 88 01 c4 1f 0b 14 ce df 9c 1b c2 34 35 65 ad c8 3a 97 b9 14 fd 90 ec a7 67 78 9b 01 b0 02 b5 d6 26 70 b5 41 7c 4c 9c 4b 6c 8a 8f 09 c6 98 05 ee 5b c2 bf a0 22 9c 97 11 ce 8f 7e 01 00 00 ff ff 0d 0a Data Ascii: d8LAK1<<baB"xfemqaq3kZ~O<[QNWvQ`/^EE8C[_jEIEuj(p845e:gx&pA|LKl["~
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:01:19 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BL7rMPSkQKOlF%2F5Ob5tz9SArufXk3d5jLRsLuUg8ZlINe8FT7Tfw0%2FfFZQKaWq14Pv8iOC2G4Ult8sH6DaM5uWytDC3vmIEkSZTeBSy2yldwbR6gLwQ4b09jVU%2BktJw0lfNr8MySjC9l"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5ee6deebc327-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1588&min_rtt=1588&rtt_var=794&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=817&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b 03 31 14 84 ef f9 15 cf de dd b7 95 1e 3c 3c 02 da dd 62 61 ad 8b a6 07 8f d1 bc 92 42 9b c4 e4 d5 e0 bf 97 dd 22 78 9d f9 66 98 a1 9b ee 65 6d de c7 1e 9e cc f3 00 e3 fe 71 d8 ae 61 71 8b b8 ed cd 06 b1 33 dd d5 b9 6b 5a c4 7e b7 d0 8a bc 9c 4f 9a 3c 5b a7 15 c9 51 4e ac 57 ed 0a 76 51 60 13 2f c1 11 5e 45 45 38 43 f4 11 dd cf 94 5b ea 7f 8c 5f 6a 45 49 1b cf 90 f9 eb c2 45 d8 c1 fe 75 80 6a 0b 84 28 70 98 38 88 01 c4 1f 0b 14 ce df 9c 1b c2 34 35 65 ad c8 3a 97 b9 14 fd 90 ec a7 67 78 9b 01 b0 02 b5 d6 26 70 b5 41 7c 4c 9c 4b 6c 8a 8f 09 c6 98 05 ee 5b c2 bf a0 22 9c 97 11 ce 8f 7e 01 00 00 ff ff e3 02 00 fa 01 eb 10 0c 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: e3LAK1<<baB"xfemqaq3kZ~O<[QNWvQ`/^EE8C[_jEIEuj(p845e:gx&pA|LKl["~0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:01:21 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MmzGoAtKnnUl27ZS58%2B7sRJgDbTyPLj6s9geh%2FBzwwiC%2BzmZNSLRKjUF6ky1t0%2B6jF4au79S5XntfLvFyrStMMREvxCx8VxvN5kHJcwLuBpwMsH%2BV69bl%2B9nDQen7qLqBKP3uNvwfbSD"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5ef6bc0041a6-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1573&rtt_var=786&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=977&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b 03 31 14 84 ef f9 15 cf de dd b7 95 1e 3c 3c 02 da dd 62 61 ad 8b a6 07 8f d1 bc 92 42 9b c4 e4 d5 e0 bf 97 dd 22 78 9d f9 66 98 a1 9b ee 65 6d de c7 1e 9e cc f3 00 e3 fe 71 d8 ae 61 71 8b b8 ed cd 06 b1 33 dd d5 b9 6b 5a c4 7e b7 d0 8a bc 9c 4f 9a 3c 5b a7 15 c9 51 4e ac 57 ed 0a 76 51 60 13 2f c1 11 5e 45 45 38 43 f4 11 dd cf 94 5b ea 7f 8c 5f 6a 45 49 1b cf 90 f9 eb c2 45 d8 c1 fe 75 80 6a 0b 84 28 70 98 38 88 01 c4 1f 0b 14 ce df 9c 1b c2 34 35 65 ad c8 3a 97 b9 14 fd 90 ec a7 67 78 9b 01 b0 02 b5 d6 26 70 b5 41 7c 4c 9c 4b 6c 8a 8f 09 c6 98 05 ee 5b c2 bf a0 22 9c 97 11 ce 8f 7e 01 00 00 ff ff e3 02 00 fa 01 eb 10 0c 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: e3LAK1<<baB"xfemqaq3kZ~O<[QNWvQ`/^EE8C[_jEIEuj(p845e:gx&pA|LKl["~0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:01:24 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QvuFn13BB381YQQ4AolgtIcWvNkjxukq6EB4ulEslU%2BEnl7vKANPFq4lLV%2B5Dsn9UGB%2BIa%2FXT%2BqslP6jxOaK5tA6xH9tuL9bWs8m9Qfctp0krE1hjfv3WitrRS96pBqJRnIm63aVtl7%2B"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd5f069dad4344-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1664&min_rtt=1664&rtt_var=832&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=524&delivery_rate=0&cwnd=157&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 30 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 65 77 61 6e 74 68 6f 70 65 72 73 6f 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at www.newanthoperso.shop Port 80</address></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:01:57 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: MmF9tcIj1J.exeString found in binary or memory: http://tempuri.org/Database1DataSet.xsd
                Source: lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3695080703.0000000005263000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.btbjpu.info
                Source: lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3695080703.0000000005263000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.btbjpu.info/w5wx/
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20-
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fburl.com
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, mshta.exe, 00000009.00000002.3695864874.00000000065F0000.00000004.00000800.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_a
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: mshta.exe, 00000009.00000003.1690137162.000000000814D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://optimize.google.com
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, mshta.exe, 00000009.00000002.3695864874.00000000065F0000.00000004.00000800.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://w.ladicdn.com/v2/source/html5shiv.min.js?v=1569310222693
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, mshta.exe, 00000009.00000002.3695864874.00000000065F0000.00000004.00000800.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://w.ladicdn.com/v2/source/respond.min.js?v=1569310222693
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com
                Source: mshta.exe, 00000009.00000003.1694672948.0000000008168000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googleanalytics.com
                Source: mshta.exe, 00000009.00000002.3693881397.000000000441A000.00000004.10000000.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3693055409.000000000367A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googleoptimize.com

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3692877173.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3695080703.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3690653132.0000000000A50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3692941025.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1508811235.00000000017E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3692821369.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1506820467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509021015.0000000002D20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0042C6D3 NtClose,4_2_0042C6D3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2B60 NtClose,LdrInitializeThunk,4_2_014B2B60
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_014B2DF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_014B2C70
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B35C0 NtCreateMutant,LdrInitializeThunk,4_2_014B35C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B4340 NtSetContextThread,4_2_014B4340
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B4650 NtSuspendThread,4_2_014B4650
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2BE0 NtQueryValueKey,4_2_014B2BE0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2BF0 NtAllocateVirtualMemory,4_2_014B2BF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2B80 NtQueryInformationFile,4_2_014B2B80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2BA0 NtEnumerateValueKey,4_2_014B2BA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2AD0 NtReadFile,4_2_014B2AD0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2AF0 NtWriteFile,4_2_014B2AF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2AB0 NtWaitForSingleObject,4_2_014B2AB0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2D00 NtSetInformationFile,4_2_014B2D00
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2D10 NtMapViewOfSection,4_2_014B2D10
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2D30 NtUnmapViewOfSection,4_2_014B2D30
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2DD0 NtDelayExecution,4_2_014B2DD0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2DB0 NtEnumerateKey,4_2_014B2DB0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2C60 NtCreateKey,4_2_014B2C60
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2C00 NtQueryInformationProcess,4_2_014B2C00
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2CC0 NtQueryVirtualMemory,4_2_014B2CC0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2CF0 NtOpenProcess,4_2_014B2CF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2CA0 NtQueryInformationToken,4_2_014B2CA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2F60 NtCreateProcessEx,4_2_014B2F60
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2F30 NtCreateSection,4_2_014B2F30
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2FE0 NtCreateFile,4_2_014B2FE0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2F90 NtProtectVirtualMemory,4_2_014B2F90
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2FA0 NtQuerySection,4_2_014B2FA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2FB0 NtResumeThread,4_2_014B2FB0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2E30 NtWriteVirtualMemory,4_2_014B2E30
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2EE0 NtQueueApcThread,4_2_014B2EE0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2E80 NtReadVirtualMemory,4_2_014B2E80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2EA0 NtAdjustPrivilegesToken,4_2_014B2EA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B3010 NtOpenDirectoryObject,4_2_014B3010
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B3090 NtSetValueKey,4_2_014B3090
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B39B0 NtGetContextThread,4_2_014B39B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B3D70 NtOpenThread,4_2_014B3D70
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B3D10 NtOpenProcessToken,4_2_014B3D10
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03464340 NtSetContextThread,LdrInitializeThunk,9_2_03464340
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03464650 NtSuspendThread,LdrInitializeThunk,9_2_03464650
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462B60 NtClose,LdrInitializeThunk,9_2_03462B60
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462BE0 NtQueryValueKey,LdrInitializeThunk,9_2_03462BE0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462BF0 NtAllocateVirtualMemory,LdrInitializeThunk,9_2_03462BF0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462BA0 NtEnumerateValueKey,LdrInitializeThunk,9_2_03462BA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462AD0 NtReadFile,LdrInitializeThunk,9_2_03462AD0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462AF0 NtWriteFile,LdrInitializeThunk,9_2_03462AF0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462F30 NtCreateSection,LdrInitializeThunk,9_2_03462F30
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462FE0 NtCreateFile,LdrInitializeThunk,9_2_03462FE0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462FB0 NtResumeThread,LdrInitializeThunk,9_2_03462FB0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462EE0 NtQueueApcThread,LdrInitializeThunk,9_2_03462EE0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462E80 NtReadVirtualMemory,LdrInitializeThunk,9_2_03462E80
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462D10 NtMapViewOfSection,LdrInitializeThunk,9_2_03462D10
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462D30 NtUnmapViewOfSection,LdrInitializeThunk,9_2_03462D30
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462DD0 NtDelayExecution,LdrInitializeThunk,9_2_03462DD0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_03462DF0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462C60 NtCreateKey,LdrInitializeThunk,9_2_03462C60
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462C70 NtFreeVirtualMemory,LdrInitializeThunk,9_2_03462C70
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462CA0 NtQueryInformationToken,LdrInitializeThunk,9_2_03462CA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034635C0 NtCreateMutant,LdrInitializeThunk,9_2_034635C0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034639B0 NtGetContextThread,LdrInitializeThunk,9_2_034639B0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462B80 NtQueryInformationFile,9_2_03462B80
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462AB0 NtWaitForSingleObject,9_2_03462AB0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462F60 NtCreateProcessEx,9_2_03462F60
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462F90 NtProtectVirtualMemory,9_2_03462F90
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462FA0 NtQuerySection,9_2_03462FA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462E30 NtWriteVirtualMemory,9_2_03462E30
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462EA0 NtAdjustPrivilegesToken,9_2_03462EA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462D00 NtSetInformationFile,9_2_03462D00
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462DB0 NtEnumerateKey,9_2_03462DB0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462C00 NtQueryInformationProcess,9_2_03462C00
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462CC0 NtQueryVirtualMemory,9_2_03462CC0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03462CF0 NtOpenProcess,9_2_03462CF0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03463010 NtOpenDirectoryObject,9_2_03463010
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03463090 NtSetValueKey,9_2_03463090
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03463D70 NtOpenThread,9_2_03463D70
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03463D10 NtOpenProcessToken,9_2_03463D10
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A79240 NtCreateFile,9_2_00A79240
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A793B0 NtReadFile,9_2_00A793B0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A794A0 NtDeleteFile,9_2_00A794A0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A79540 NtClose,9_2_00A79540
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A796B0 NtAllocateVirtualMemory,9_2_00A796B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C700400_2_04C70040
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C7AC280_2_04C7AC28
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C724780_2_04C72478
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C775A00_2_04C775A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C700070_2_04C70007
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C771680_2_04C77168
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C792400_2_04C79240
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C7E2280_2_04C7E228
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C7AC180_2_04C7AC18
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C76D300_2_04C76D30
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C768F80_2_04C768F8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_0514DF6C0_2_0514DF6C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_004185734_2_00418573
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040E0774_2_0040E077
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040E0834_2_0040E083
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_004011104_2_00401110
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00402A404_2_00402A40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00402A3A4_2_00402A3A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040445F4_2_0040445F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0042ECF34_2_0042ECF3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040FD2E4_2_0040FD2E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040FD334_2_0040FD33
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_004026604_2_00402660
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040FF534_2_0040FF53
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_004167734_2_00416773
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00402F204_2_00402F20
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040DF334_2_0040DF33
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015081584_2_01508158
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014701004_2_01470100
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151A1184_2_0151A118
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015381CC4_2_015381CC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015341A24_2_015341A2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015401AA4_2_015401AA
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015120004_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153A3524_2_0153A352
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015403E64_2_015403E6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E3F04_2_0148E3F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015202744_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015002C04_2_015002C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014805354_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015405914_2_01540591
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015324464_2_01532446
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015244204_2_01524420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152E4F64_2_0152E4F6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A47504_2_014A4750
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014807704_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147C7C04_2_0147C7C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149C6E04_2_0149C6E0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014969624_2_01496962
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0154A9A64_2_0154A9A6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148A8404_2_0148A840
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE8F04_2_014AE8F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014668B84_2_014668B8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153AB404_2_0153AB40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01536BD74_2_01536BD7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA804_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148AD004_2_0148AD00
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151CD1F4_2_0151CD1F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147ADE04_2_0147ADE0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01498DBF4_2_01498DBF
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480C004_2_01480C00
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470CF24_2_01470CF2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520CB54_2_01520CB5
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F4F404_2_014F4F40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01522F304_2_01522F30
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C2F284_2_014C2F28
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A0F304_2_014A0F30
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01472FC84_2_01472FC8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148CFE04_2_0148CFE0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FEFA04_2_014FEFA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480E594_2_01480E59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153EE264_2_0153EE26
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153EEDB4_2_0153EEDB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153CE934_2_0153CE93
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492E904_2_01492E90
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B516C4_2_014B516C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146F1724_2_0146F172
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0154B16B4_2_0154B16B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148B1B04_2_0148B1B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152F0CC4_2_0152F0CC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153F0E04_2_0153F0E0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015370E94_2_015370E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146D34C4_2_0146D34C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153132D4_2_0153132D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C739A4_2_014C739A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149B2C04_2_0149B2C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015212ED4_2_015212ED
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014852A04_2_014852A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015375714_2_01537571
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015495C34_2_015495C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151D5B04_2_0151D5B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014714604_2_01471460
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153F43F4_2_0153F43F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153F7B04_2_0153F7B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C56304_2_014C5630
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015316CC4_2_015316CC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014899504_2_01489950
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149B9504_2_0149B950
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015159104_2_01515910
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ED8004_2_014ED800
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014838E04_2_014838E0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153FB764_2_0153FB76
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014BDBF94_2_014BDBF9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F5BF04_2_014F5BF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149FB804_2_0149FB80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01537A464_2_01537A46
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153FA494_2_0153FA49
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F3A6C4_2_014F3A6C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152DAC64_2_0152DAC6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C5AA04_2_014C5AA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01521AA34_2_01521AA3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01483D404_2_01483D40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01531D5A4_2_01531D5A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01537D734_2_01537D73
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149FDC04_2_0149FDC0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F9C324_2_014F9C32
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153FCF24_2_0153FCF2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153FF094_2_0153FF09
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01443FD54_2_01443FD5
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01443FD24_2_01443FD2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01481F924_2_01481F92
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153FFB14_2_0153FFB1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01489EB04_2_01489EB0
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D0F3DE8_2_03D0F3DE
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D06B9E8_2_03D06B9E
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D08BBE8_2_03D08BBE
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D111D88_2_03D111D8
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D089998_2_03D08999
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D0899E8_2_03D0899E
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D2795E8_2_03D2795E
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D06CE28_2_03D06CE2
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D06CEE8_2_03D06CEE
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EA3529_2_034EA352
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034F03E69_2_034F03E6
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0343E3F09_2_0343E3F0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034D02749_2_034D0274
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034B02C09_2_034B02C0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034B81589_2_034B8158
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034201009_2_03420100
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034CA1189_2_034CA118
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E81CC9_2_034E81CC
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034F01AA9_2_034F01AA
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034C20009_2_034C2000
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034547509_2_03454750
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034307709_2_03430770
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0342C7C09_2_0342C7C0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0344C6E09_2_0344C6E0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034305359_2_03430535
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034F05919_2_034F0591
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E24469_2_034E2446
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034D44209_2_034D4420
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034DE4F69_2_034DE4F6
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EAB409_2_034EAB40
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E6BD79_2_034E6BD7
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0342EA809_2_0342EA80
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034469629_2_03446962
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034FA9A69_2_034FA9A6
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0343A8409_2_0343A840
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0345E8F09_2_0345E8F0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034168B89_2_034168B8
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034A4F409_2_034A4F40
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03472F289_2_03472F28
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03450F309_2_03450F30
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034D2F309_2_034D2F30
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03422FC89_2_03422FC8
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0343CFE09_2_0343CFE0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034AEFA09_2_034AEFA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03430E599_2_03430E59
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EEE269_2_034EEE26
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EEEDB9_2_034EEEDB
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03442E909_2_03442E90
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034ECE939_2_034ECE93
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0343AD009_2_0343AD00
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034CCD1F9_2_034CCD1F
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0342ADE09_2_0342ADE0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03448DBF9_2_03448DBF
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03430C009_2_03430C00
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03420CF29_2_03420CF2
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034D0CB59_2_034D0CB5
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0341D34C9_2_0341D34C
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E132D9_2_034E132D
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0347739A9_2_0347739A
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0344B2C09_2_0344B2C0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034D12ED9_2_034D12ED
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034352A09_2_034352A0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034FB16B9_2_034FB16B
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0346516C9_2_0346516C
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0341F1729_2_0341F172
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0343B1B09_2_0343B1B0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034DF0CC9_2_034DF0CC
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E70E99_2_034E70E9
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EF0E09_2_034EF0E0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EF7B09_2_034EF7B0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E16CC9_2_034E16CC
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E75719_2_034E7571
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034CD5B09_2_034CD5B0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034214609_2_03421460
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EF43F9_2_034EF43F
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EFB769_2_034EFB76
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034A5BF09_2_034A5BF0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0346DBF99_2_0346DBF9
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0344FB809_2_0344FB80
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EFA499_2_034EFA49
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E7A469_2_034E7A46
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034A3A6C9_2_034A3A6C
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034DDAC69_2_034DDAC6
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03475AA09_2_03475AA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034D1AA39_2_034D1AA3
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034399509_2_03439950
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0344B9509_2_0344B950
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034C59109_2_034C5910
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0349D8009_2_0349D800
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034338E09_2_034338E0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EFF099_2_034EFF09
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03431F929_2_03431F92
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EFFB19_2_034EFFB1
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03439EB09_2_03439EB0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_03433D409_2_03433D40
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E1D5A9_2_034E1D5A
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034E7D739_2_034E7D73
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_0344FDC09_2_0344FDC0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034A9C329_2_034A9C32
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034EFCF29_2_034EFCF2
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A61D209_2_00A61D20
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A5CBA09_2_00A5CBA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A5CB9B9_2_00A5CB9B
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A5ADA09_2_00A5ADA0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A5CDC09_2_00A5CDC0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A5AEE49_2_00A5AEE4
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A5AEF09_2_00A5AEF0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A512CC9_2_00A512CC
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A653E09_2_00A653E0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A635E09_2_00A635E0
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A7BB609_2_00A7BB60
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_037FE3869_2_037FE386
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_037FE79C9_2_037FE79C
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_037FE4A49_2_037FE4A4
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_037FCBA39_2_037FCBA3
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_037FD9089_2_037FD908
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: String function: 014B5130 appears 58 times
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: String function: 0146B970 appears 250 times
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: String function: 014C7E54 appears 110 times
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: String function: 014FF290 appears 105 times
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: String function: 014EEA12 appears 86 times
                Source: C:\Windows\SysWOW64\mshta.exeCode function: String function: 034AF290 appears 105 times
                Source: C:\Windows\SysWOW64\mshta.exeCode function: String function: 03477E54 appears 101 times
                Source: C:\Windows\SysWOW64\mshta.exeCode function: String function: 0349EA12 appears 86 times
                Source: C:\Windows\SysWOW64\mshta.exeCode function: String function: 0341B970 appears 250 times
                Source: C:\Windows\SysWOW64\mshta.exeCode function: String function: 03465130 appears 58 times
                Source: MmF9tcIj1J.exe, 00000000.00000000.1225581960.00000000009AA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNEOn.exe4 vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exe, 00000000.00000002.1287664509.000000000A460000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exe, 00000000.00000002.1277546651.0000000000F4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exe, 00000004.00000002.1507065834.0000000000FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSHTA.EXED vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exe, 00000004.00000002.1507208063.000000000156D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exe, 00000004.00000002.1507065834.0000000000FE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSHTA.EXED vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exeBinary or memory string: OriginalFilenameNEOn.exe4 vs MmF9tcIj1J.exe
                Source: MmF9tcIj1J.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: MmF9tcIj1J.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Lc4bZFGNdITBykgft4.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Lc4bZFGNdITBykgft4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Lc4bZFGNdITBykgft4.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Lc4bZFGNdITBykgft4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, YR3UhFBCAwxsjWMigU.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Lc4bZFGNdITBykgft4.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Lc4bZFGNdITBykgft4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@16/11
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MmF9tcIj1J.exe.logJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\mshta.exeFile created: C:\Users\user\AppData\Local\Temp\3d8W0FRJump to behavior
                Source: MmF9tcIj1J.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: MmF9tcIj1J.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002DFB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3691268424.0000000002DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: MmF9tcIj1J.exeReversingLabs: Detection: 76%
                Source: MmF9tcIj1J.exeVirustotal: Detection: 70%
                Source: unknownProcess created: C:\Users\user\Desktop\MmF9tcIj1J.exe "C:\Users\user\Desktop\MmF9tcIj1J.exe"
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess created: C:\Users\user\Desktop\MmF9tcIj1J.exe "C:\Users\user\Desktop\MmF9tcIj1J.exe"
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess created: C:\Users\user\Desktop\MmF9tcIj1J.exe "C:\Users\user\Desktop\MmF9tcIj1J.exe"Jump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: MmF9tcIj1J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: MmF9tcIj1J.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: MmF9tcIj1J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: NEOn.pdb source: MmF9tcIj1J.exe
                Source: Binary string: mshta.pdbGCTL source: MmF9tcIj1J.exe, 00000004.00000002.1507065834.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3691897348.000000000086E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: MmF9tcIj1J.exe, 00000004.00000002.1507208063.0000000001440000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, 00000009.00000003.1507163146.000000000308A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, 00000009.00000003.1509681517.0000000003248000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.000000000358E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: NEOn.pdbSHA256 source: MmF9tcIj1J.exe
                Source: Binary string: wntdll.pdb source: MmF9tcIj1J.exe, MmF9tcIj1J.exe, 00000004.00000002.1507208063.0000000001440000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, mshta.exe, 00000009.00000003.1507163146.000000000308A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, mshta.exe, 00000009.00000003.1509681517.0000000003248000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000009.00000002.3693186832.000000000358E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: mshta.pdb source: MmF9tcIj1J.exe, 00000004.00000002.1507065834.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3691897348.000000000086E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: lq9nGfkZ7JbZdUv7.exe, 00000008.00000000.1429101175.00000000002DF000.00000002.00000001.01000000.0000000A.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3690719075.00000000002DF000.00000002.00000001.01000000.0000000A.sdmp

                Data Obfuscation

                barindex
                Source: 0.2.MmF9tcIj1J.exe.3c8a7e8.4.raw.unpack, MainForm.cs.Net Code: _200C_202A_200E_202D_202D_206E_202D_202E_202A_206A_200E_202D_206B_206B_206E_206A_202C_206E_202E_200D_206B_206E_202C_202C_202B_200E_200C_202B_202C_206E_200D_200E_206C_202A_202E_206C_202B_202D_206B_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, YR3UhFBCAwxsjWMigU.cs.Net Code: crFF3w1J41 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, YR3UhFBCAwxsjWMigU.cs.Net Code: crFF3w1J41 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, YR3UhFBCAwxsjWMigU.cs.Net Code: crFF3w1J41 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.MmF9tcIj1J.exe.3caa808.3.raw.unpack, MainForm.cs.Net Code: _200C_202A_200E_202D_202D_206E_202D_202E_202A_206A_200E_202D_206B_206B_206E_206A_202C_206E_202E_200D_206B_206E_202C_202C_202B_200E_200C_202B_202C_206E_200D_200E_206C_202A_202E_206C_202B_202D_206B_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C7D48C push esi; iretd 0_2_04C7D48F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_04C7AB5C push E80571EFh; retf 0_2_04C7AB61
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 0_2_0514D5D0 push eax; iretd 0_2_0514D5D1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00402020 push cs; ret 4_2_0040202C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00405025 push es; iretd 4_2_00405026
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0041490A push edx; iretd 4_2_0041490E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00403190 push eax; ret 4_2_00403192
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00426AE3 push ds; iretd 4_2_00426A6B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00426AE3 push edi; iretd 4_2_00426BE1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00411AFB push ebx; retf 4_2_00411B01
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_004082AF pushfd ; retf 4_2_004082B8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0041A54F pushfd ; iretd 4_2_0041A560
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0041A553 pushfd ; iretd 4_2_0041A560
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0041A561 push esi; iretd 4_2_0041A564
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0040D573 push ecx; ret 4_2_0040D574
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0041661A push edi; retf 4_2_00416620
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00405EB7 push 0000000Eh; iretd 4_2_00405EC1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0144225F pushad ; ret 4_2_014427F9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014427FA pushad ; ret 4_2_014427F9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014709AD push ecx; mov dword ptr [esp], ecx4_2_014709B6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0144283D push eax; iretd 4_2_01442858
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03CFEB22 push 0000000Eh; iretd 8_2_03CFEB2C
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D0F285 push edi; retf 8_2_03D0F28B
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D061DE push ecx; ret 8_2_03D061DF
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D131CC push esi; iretd 8_2_03D131CF
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D131BA pushfd ; iretd 8_2_03D131CB
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D0A766 push ebx; retf 8_2_03D0A76C
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D00F1A pushfd ; retf 8_2_03D00F23
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03D0D575 push edx; iretd 8_2_03D0D579
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeCode function: 8_2_03CFDC90 push es; iretd 8_2_03CFDC91
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_034209AD push ecx; mov dword ptr [esp], ecx9_2_034209B6
                Source: MmF9tcIj1J.exeStatic PE information: section name: .text entropy: 7.729226353706977
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, NPTeZCbRKhuUjAUPpq.csHigh entropy of concatenated method names: 'KeqSaeZBNs', 'XQISWepXBl', 'GbFywDL68G', 'aMTytr0BXu', 'vKWSDlCbto', 'XbZSqXeNXJ', 'gE5S2tgeba', 'Tr5STMLxDO', 'b7wSuosA84', 'rAfSOADSGP'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, s4O5lkhFhKnR0JUHmQ.csHigh entropy of concatenated method names: 'EP53tiE3M', 'aSb5Ueb4i', 'hPM6gHyxd', 'JgmJTfF1v', 'eQ0YZVkbE', 'Ps6oI2d4h', 'VCRPA6PPweXo60HXwU', 'VQVdMynylCABJdNA2R', 'r0hy28YZw', 'TVXfwxcT5'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, rP38Rc8XiSxQ5kvdiU.csHigh entropy of concatenated method names: 'UUNQRumY88', 'npEQkvGDHL', 'xvfQjrbfvM', 'EOtQmh1O0L', 'OQRQKZYlrx', 'gsoQ0IPXdD', 'bRFQNW6BXx', 'PJnQ7k1X1c', 'AGjQLxNdxi', 'nPKQVIlfFb'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Gd76mDWZKpqfwPKmka.csHigh entropy of concatenated method names: 'jiLflDRYaW', 'F91fA5X2Pw', 'aqAf4ZIymE', 'qgRfCZAh86', 'xxrfQagSAV', 'dvhfBDGeAx', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, TYyClyOeXd3w466CEj.csHigh entropy of concatenated method names: 'ToString', 'EqhsDnZ36N', 'svosk7HlOm', 'M3CsjGwTAg', 'mtjsmqF49r', 'VcAsKF7OGV', 'IKps0bk4YM', 'XwcsNZNLxe', 'B1Rs7DMnjs', 'HXrsLWjb2w'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Fruk7QkrUMaigfoKyg.csHigh entropy of concatenated method names: 'fX0jxgEKSRXxMw51B47', 'APW4YcEsLVnmFn8Vnso', 'Cvi4ynjcbt', 'eLX4QaxyCG', 'yZH4fuVppd', 'G9TRH2EU4r7Ji4V6qaC', 'rgNQ9LE02EraIKYatYe'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, RknYeUtF7jZHMvrA5KU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'riOiQsjtwA', 'k21iffJ91Q', 'RMdiviFsGZ', 'H5IiikM4Kj', 'DpQiIIu1ZX', 'oJpicUDkc9', 'TOAin4ymt9'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, V9Jx9IFC23Jbc4pNda.csHigh entropy of concatenated method names: 'DgNtCc4bZF', 'KdItBTBykg', 'sRYtPf9OEe', 'orLtd9WZNp', 'n3ptHmKexr', 'xA0tslMhYQ', 'o4FpZRGNijQxxwwe7K', 'vL0P9vcmKlqvaBQ2t1', 'wrxttwUfyF', 'tW4tMNKYFq'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, cRFNdgTmP0eY04ienr.csHigh entropy of concatenated method names: 'vAUHVv0445', 'zvsHqSi3Sk', 'furHTAZFxm', 'lKJHuRvpJf', 'NYRHkOrGRK', 'iqSHjVm40h', 'rsCHmlB2MU', 'wRbHKEPtAs', 'vw7H0BQuM0', 'hVTHNOnFma'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, ijjPIXLRhmcgw3Y6Ch.csHigh entropy of concatenated method names: 'BWuCpyoqd9', 'mhlCXa1nGi', 'PBtC3o5LZJ', 'fAhC5RCxmg', 'UHYCZsGlpf', 'FQHC6YTMK6', 'Br1CJAaUSI', 'efBCGwB138', 'EAUCY6iTp7', 'FYuCoC8KhZ'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Lc4bZFGNdITBykgft4.csHigh entropy of concatenated method names: 'OElxTgpFnU', 'MD0xutKMsh', 'eVQxOCJ7kl', 'lkNxrTZpoG', 'GDTxgiEtE6', 'xBkxbfe5qO', 'IZwx1QGgJk', 'N0gxaTiQTf', 'bP0x8j51WC', 'KQYxWrFAk9'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, nxSi3fYRYf9OEeerL9.csHigh entropy of concatenated method names: 'irCl528wcZ', 'yl7l6tMrNv', 'vEslGrTm0q', 'tn4lY9BAH9', 'TvslHWFBW2', 'BIxlsC7fA3', 'I7olSYe3dt', 'vyhly38eyk', 'luDlQrZ3EB', 'G4Olfh1IH6'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, YZNps8ofNIeare3pmK.csHigh entropy of concatenated method names: 'c6VAZsP06F', 'hMeAJAudMO', 'Dm1ljdcsUZ', 'KHWlmfQW7a', 'X9jlK9sZVs', 'Jvpl08sLb7', 'fcXlNU0LVn', 'kj3l7ERb4Y', 'rs9lLsTIDC', 'ocplVHb3ZR'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Vgce4pttdJNiloW91AN.csHigh entropy of concatenated method names: 'LDcfW6XhRy', 'gmnfzofaTZ', 'kO6vwgDKKM', 'N63vtkMYPt', 'qBNvhyp9JU', 'EA1vMBuoU2', 'qNZvFtJ7Qv', 'jUyvUsvEUM', 'hRRv9quFdT', 'qW2vxybINx'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, Fn31Uxr7qZiuLg14s4.csHigh entropy of concatenated method names: 'CQJSPZLWD0', 'dAnSd6HI2w', 'ToString', 'LYnS9G5abo', 'mt5SxnpV7V', 'xiMSlWjWKX', 'bt5SAZUxLb', 'RqJS4Kaie5', 'Vb7SC31nmE', 'QO0SBsoVco'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, MeK5j51KK7Zo9MYpfs.csHigh entropy of concatenated method names: 'QplQHqJJpK', 'pslQSaY6EE', 'NO2QQYEqdn', 'BNrQv3kKpF', 'bFDQIqDgOI', 'H5SQnHAN8M', 'Dispose', 'uaay9gRpGp', 'rSryx9u70g', 'uCYylq7ibG'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, cd5UL2xGpTyZLdPmf9.csHigh entropy of concatenated method names: 'Dispose', 'MZot89MYpf', 'Fqkhk2wUDU', 'FcijwEfmkc', 'ppWtWAenl9', 'rnftzioPPq', 'ProcessDialogKey', 'G9QhwP38Rc', 'yiShtxQ5kv', 'niUhhRd76m'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, OxVokS2EHy4Z6aRHLG.csHigh entropy of concatenated method names: 'RTQeGLoIuP', 'vhceYFbZRZ', 'HeMeRoR3I4', 'obwekpxrAI', 'nh5emA60rd', 'o9teKN8Ykj', 'ewweNl5Mth', 'BHNe7NXsQV', 'AfGeVaYR6B', 'IaieDoTH44'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, VvMa2YtMfAErLVpMR9W.csHigh entropy of concatenated method names: 'CPTvWHGvac', 'QVKvzvqmMX', 'sMxiwJyh7O', 'W55JfOj8NTNRrDfGu8F', 'YJqmppjrCKwqVsGAIoS', 'E4t56ZjGnQfynsMmbNp', 'vQvdqojcIu7BrB8aTZ1', 'aB3g2djz2tyxV4dYUGu'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, nxrpA0RlMhYQGDbFB5.csHigh entropy of concatenated method names: 'TYP4UnuSod', 'zx14xVL18O', 'iGB4ABKp8N', 'Gqs4CPZQl7', 'rwn4BKBMZI', 'qwKAg0ayQU', 'LCRAbuOP5J', 'a55A1t9lQn', 'UxZAaZ2tvN', 'Yt2A8OnA8a'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, YR3UhFBCAwxsjWMigU.csHigh entropy of concatenated method names: 'A57MUq6rVO', 'mjfM9KAmTL', 'QgvMxsYWwY', 'gb1Mlsnbjc', 'KQrMA6cg9u', 'AY2M4UWPPG', 'vFBMCfFvVh', 'cbAMBJ168K', 'xYmMElyDG1', 'bMvMPtNlX6'
                Source: 0.2.MmF9tcIj1J.exe.4701128.2.raw.unpack, yFqoYQzcZERJEEHrlC.csHigh entropy of concatenated method names: 'RE1f6KE7eZ', 'BeafGPK59m', 'RAgfY7nmGg', 'ruMfRdV2GA', 'zHAfkePlDm', 'hq3fmYP6u1', 'GKYfKRlgRh', 'WmffnyDJmo', 'AdGfpQIBKg', 'il6fXp6twb'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, NPTeZCbRKhuUjAUPpq.csHigh entropy of concatenated method names: 'KeqSaeZBNs', 'XQISWepXBl', 'GbFywDL68G', 'aMTytr0BXu', 'vKWSDlCbto', 'XbZSqXeNXJ', 'gE5S2tgeba', 'Tr5STMLxDO', 'b7wSuosA84', 'rAfSOADSGP'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, s4O5lkhFhKnR0JUHmQ.csHigh entropy of concatenated method names: 'EP53tiE3M', 'aSb5Ueb4i', 'hPM6gHyxd', 'JgmJTfF1v', 'eQ0YZVkbE', 'Ps6oI2d4h', 'VCRPA6PPweXo60HXwU', 'VQVdMynylCABJdNA2R', 'r0hy28YZw', 'TVXfwxcT5'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, rP38Rc8XiSxQ5kvdiU.csHigh entropy of concatenated method names: 'UUNQRumY88', 'npEQkvGDHL', 'xvfQjrbfvM', 'EOtQmh1O0L', 'OQRQKZYlrx', 'gsoQ0IPXdD', 'bRFQNW6BXx', 'PJnQ7k1X1c', 'AGjQLxNdxi', 'nPKQVIlfFb'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Gd76mDWZKpqfwPKmka.csHigh entropy of concatenated method names: 'jiLflDRYaW', 'F91fA5X2Pw', 'aqAf4ZIymE', 'qgRfCZAh86', 'xxrfQagSAV', 'dvhfBDGeAx', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, TYyClyOeXd3w466CEj.csHigh entropy of concatenated method names: 'ToString', 'EqhsDnZ36N', 'svosk7HlOm', 'M3CsjGwTAg', 'mtjsmqF49r', 'VcAsKF7OGV', 'IKps0bk4YM', 'XwcsNZNLxe', 'B1Rs7DMnjs', 'HXrsLWjb2w'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Fruk7QkrUMaigfoKyg.csHigh entropy of concatenated method names: 'fX0jxgEKSRXxMw51B47', 'APW4YcEsLVnmFn8Vnso', 'Cvi4ynjcbt', 'eLX4QaxyCG', 'yZH4fuVppd', 'G9TRH2EU4r7Ji4V6qaC', 'rgNQ9LE02EraIKYatYe'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, RknYeUtF7jZHMvrA5KU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'riOiQsjtwA', 'k21iffJ91Q', 'RMdiviFsGZ', 'H5IiikM4Kj', 'DpQiIIu1ZX', 'oJpicUDkc9', 'TOAin4ymt9'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, V9Jx9IFC23Jbc4pNda.csHigh entropy of concatenated method names: 'DgNtCc4bZF', 'KdItBTBykg', 'sRYtPf9OEe', 'orLtd9WZNp', 'n3ptHmKexr', 'xA0tslMhYQ', 'o4FpZRGNijQxxwwe7K', 'vL0P9vcmKlqvaBQ2t1', 'wrxttwUfyF', 'tW4tMNKYFq'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, cRFNdgTmP0eY04ienr.csHigh entropy of concatenated method names: 'vAUHVv0445', 'zvsHqSi3Sk', 'furHTAZFxm', 'lKJHuRvpJf', 'NYRHkOrGRK', 'iqSHjVm40h', 'rsCHmlB2MU', 'wRbHKEPtAs', 'vw7H0BQuM0', 'hVTHNOnFma'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, ijjPIXLRhmcgw3Y6Ch.csHigh entropy of concatenated method names: 'BWuCpyoqd9', 'mhlCXa1nGi', 'PBtC3o5LZJ', 'fAhC5RCxmg', 'UHYCZsGlpf', 'FQHC6YTMK6', 'Br1CJAaUSI', 'efBCGwB138', 'EAUCY6iTp7', 'FYuCoC8KhZ'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Lc4bZFGNdITBykgft4.csHigh entropy of concatenated method names: 'OElxTgpFnU', 'MD0xutKMsh', 'eVQxOCJ7kl', 'lkNxrTZpoG', 'GDTxgiEtE6', 'xBkxbfe5qO', 'IZwx1QGgJk', 'N0gxaTiQTf', 'bP0x8j51WC', 'KQYxWrFAk9'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, nxSi3fYRYf9OEeerL9.csHigh entropy of concatenated method names: 'irCl528wcZ', 'yl7l6tMrNv', 'vEslGrTm0q', 'tn4lY9BAH9', 'TvslHWFBW2', 'BIxlsC7fA3', 'I7olSYe3dt', 'vyhly38eyk', 'luDlQrZ3EB', 'G4Olfh1IH6'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, YZNps8ofNIeare3pmK.csHigh entropy of concatenated method names: 'c6VAZsP06F', 'hMeAJAudMO', 'Dm1ljdcsUZ', 'KHWlmfQW7a', 'X9jlK9sZVs', 'Jvpl08sLb7', 'fcXlNU0LVn', 'kj3l7ERb4Y', 'rs9lLsTIDC', 'ocplVHb3ZR'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Vgce4pttdJNiloW91AN.csHigh entropy of concatenated method names: 'LDcfW6XhRy', 'gmnfzofaTZ', 'kO6vwgDKKM', 'N63vtkMYPt', 'qBNvhyp9JU', 'EA1vMBuoU2', 'qNZvFtJ7Qv', 'jUyvUsvEUM', 'hRRv9quFdT', 'qW2vxybINx'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, Fn31Uxr7qZiuLg14s4.csHigh entropy of concatenated method names: 'CQJSPZLWD0', 'dAnSd6HI2w', 'ToString', 'LYnS9G5abo', 'mt5SxnpV7V', 'xiMSlWjWKX', 'bt5SAZUxLb', 'RqJS4Kaie5', 'Vb7SC31nmE', 'QO0SBsoVco'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, MeK5j51KK7Zo9MYpfs.csHigh entropy of concatenated method names: 'QplQHqJJpK', 'pslQSaY6EE', 'NO2QQYEqdn', 'BNrQv3kKpF', 'bFDQIqDgOI', 'H5SQnHAN8M', 'Dispose', 'uaay9gRpGp', 'rSryx9u70g', 'uCYylq7ibG'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, cd5UL2xGpTyZLdPmf9.csHigh entropy of concatenated method names: 'Dispose', 'MZot89MYpf', 'Fqkhk2wUDU', 'FcijwEfmkc', 'ppWtWAenl9', 'rnftzioPPq', 'ProcessDialogKey', 'G9QhwP38Rc', 'yiShtxQ5kv', 'niUhhRd76m'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, OxVokS2EHy4Z6aRHLG.csHigh entropy of concatenated method names: 'RTQeGLoIuP', 'vhceYFbZRZ', 'HeMeRoR3I4', 'obwekpxrAI', 'nh5emA60rd', 'o9teKN8Ykj', 'ewweNl5Mth', 'BHNe7NXsQV', 'AfGeVaYR6B', 'IaieDoTH44'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, VvMa2YtMfAErLVpMR9W.csHigh entropy of concatenated method names: 'CPTvWHGvac', 'QVKvzvqmMX', 'sMxiwJyh7O', 'W55JfOj8NTNRrDfGu8F', 'YJqmppjrCKwqVsGAIoS', 'E4t56ZjGnQfynsMmbNp', 'vQvdqojcIu7BrB8aTZ1', 'aB3g2djz2tyxV4dYUGu'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, nxrpA0RlMhYQGDbFB5.csHigh entropy of concatenated method names: 'TYP4UnuSod', 'zx14xVL18O', 'iGB4ABKp8N', 'Gqs4CPZQl7', 'rwn4BKBMZI', 'qwKAg0ayQU', 'LCRAbuOP5J', 'a55A1t9lQn', 'UxZAaZ2tvN', 'Yt2A8OnA8a'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, YR3UhFBCAwxsjWMigU.csHigh entropy of concatenated method names: 'A57MUq6rVO', 'mjfM9KAmTL', 'QgvMxsYWwY', 'gb1Mlsnbjc', 'KQrMA6cg9u', 'AY2M4UWPPG', 'vFBMCfFvVh', 'cbAMBJ168K', 'xYmMElyDG1', 'bMvMPtNlX6'
                Source: 0.2.MmF9tcIj1J.exe.a460000.6.raw.unpack, yFqoYQzcZERJEEHrlC.csHigh entropy of concatenated method names: 'RE1f6KE7eZ', 'BeafGPK59m', 'RAgfY7nmGg', 'ruMfRdV2GA', 'zHAfkePlDm', 'hq3fmYP6u1', 'GKYfKRlgRh', 'WmffnyDJmo', 'AdGfpQIBKg', 'il6fXp6twb'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, NPTeZCbRKhuUjAUPpq.csHigh entropy of concatenated method names: 'KeqSaeZBNs', 'XQISWepXBl', 'GbFywDL68G', 'aMTytr0BXu', 'vKWSDlCbto', 'XbZSqXeNXJ', 'gE5S2tgeba', 'Tr5STMLxDO', 'b7wSuosA84', 'rAfSOADSGP'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, s4O5lkhFhKnR0JUHmQ.csHigh entropy of concatenated method names: 'EP53tiE3M', 'aSb5Ueb4i', 'hPM6gHyxd', 'JgmJTfF1v', 'eQ0YZVkbE', 'Ps6oI2d4h', 'VCRPA6PPweXo60HXwU', 'VQVdMynylCABJdNA2R', 'r0hy28YZw', 'TVXfwxcT5'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, rP38Rc8XiSxQ5kvdiU.csHigh entropy of concatenated method names: 'UUNQRumY88', 'npEQkvGDHL', 'xvfQjrbfvM', 'EOtQmh1O0L', 'OQRQKZYlrx', 'gsoQ0IPXdD', 'bRFQNW6BXx', 'PJnQ7k1X1c', 'AGjQLxNdxi', 'nPKQVIlfFb'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Gd76mDWZKpqfwPKmka.csHigh entropy of concatenated method names: 'jiLflDRYaW', 'F91fA5X2Pw', 'aqAf4ZIymE', 'qgRfCZAh86', 'xxrfQagSAV', 'dvhfBDGeAx', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, TYyClyOeXd3w466CEj.csHigh entropy of concatenated method names: 'ToString', 'EqhsDnZ36N', 'svosk7HlOm', 'M3CsjGwTAg', 'mtjsmqF49r', 'VcAsKF7OGV', 'IKps0bk4YM', 'XwcsNZNLxe', 'B1Rs7DMnjs', 'HXrsLWjb2w'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Fruk7QkrUMaigfoKyg.csHigh entropy of concatenated method names: 'fX0jxgEKSRXxMw51B47', 'APW4YcEsLVnmFn8Vnso', 'Cvi4ynjcbt', 'eLX4QaxyCG', 'yZH4fuVppd', 'G9TRH2EU4r7Ji4V6qaC', 'rgNQ9LE02EraIKYatYe'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, RknYeUtF7jZHMvrA5KU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'riOiQsjtwA', 'k21iffJ91Q', 'RMdiviFsGZ', 'H5IiikM4Kj', 'DpQiIIu1ZX', 'oJpicUDkc9', 'TOAin4ymt9'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, V9Jx9IFC23Jbc4pNda.csHigh entropy of concatenated method names: 'DgNtCc4bZF', 'KdItBTBykg', 'sRYtPf9OEe', 'orLtd9WZNp', 'n3ptHmKexr', 'xA0tslMhYQ', 'o4FpZRGNijQxxwwe7K', 'vL0P9vcmKlqvaBQ2t1', 'wrxttwUfyF', 'tW4tMNKYFq'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, cRFNdgTmP0eY04ienr.csHigh entropy of concatenated method names: 'vAUHVv0445', 'zvsHqSi3Sk', 'furHTAZFxm', 'lKJHuRvpJf', 'NYRHkOrGRK', 'iqSHjVm40h', 'rsCHmlB2MU', 'wRbHKEPtAs', 'vw7H0BQuM0', 'hVTHNOnFma'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, ijjPIXLRhmcgw3Y6Ch.csHigh entropy of concatenated method names: 'BWuCpyoqd9', 'mhlCXa1nGi', 'PBtC3o5LZJ', 'fAhC5RCxmg', 'UHYCZsGlpf', 'FQHC6YTMK6', 'Br1CJAaUSI', 'efBCGwB138', 'EAUCY6iTp7', 'FYuCoC8KhZ'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Lc4bZFGNdITBykgft4.csHigh entropy of concatenated method names: 'OElxTgpFnU', 'MD0xutKMsh', 'eVQxOCJ7kl', 'lkNxrTZpoG', 'GDTxgiEtE6', 'xBkxbfe5qO', 'IZwx1QGgJk', 'N0gxaTiQTf', 'bP0x8j51WC', 'KQYxWrFAk9'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, nxSi3fYRYf9OEeerL9.csHigh entropy of concatenated method names: 'irCl528wcZ', 'yl7l6tMrNv', 'vEslGrTm0q', 'tn4lY9BAH9', 'TvslHWFBW2', 'BIxlsC7fA3', 'I7olSYe3dt', 'vyhly38eyk', 'luDlQrZ3EB', 'G4Olfh1IH6'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, YZNps8ofNIeare3pmK.csHigh entropy of concatenated method names: 'c6VAZsP06F', 'hMeAJAudMO', 'Dm1ljdcsUZ', 'KHWlmfQW7a', 'X9jlK9sZVs', 'Jvpl08sLb7', 'fcXlNU0LVn', 'kj3l7ERb4Y', 'rs9lLsTIDC', 'ocplVHb3ZR'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Vgce4pttdJNiloW91AN.csHigh entropy of concatenated method names: 'LDcfW6XhRy', 'gmnfzofaTZ', 'kO6vwgDKKM', 'N63vtkMYPt', 'qBNvhyp9JU', 'EA1vMBuoU2', 'qNZvFtJ7Qv', 'jUyvUsvEUM', 'hRRv9quFdT', 'qW2vxybINx'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, Fn31Uxr7qZiuLg14s4.csHigh entropy of concatenated method names: 'CQJSPZLWD0', 'dAnSd6HI2w', 'ToString', 'LYnS9G5abo', 'mt5SxnpV7V', 'xiMSlWjWKX', 'bt5SAZUxLb', 'RqJS4Kaie5', 'Vb7SC31nmE', 'QO0SBsoVco'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, MeK5j51KK7Zo9MYpfs.csHigh entropy of concatenated method names: 'QplQHqJJpK', 'pslQSaY6EE', 'NO2QQYEqdn', 'BNrQv3kKpF', 'bFDQIqDgOI', 'H5SQnHAN8M', 'Dispose', 'uaay9gRpGp', 'rSryx9u70g', 'uCYylq7ibG'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, cd5UL2xGpTyZLdPmf9.csHigh entropy of concatenated method names: 'Dispose', 'MZot89MYpf', 'Fqkhk2wUDU', 'FcijwEfmkc', 'ppWtWAenl9', 'rnftzioPPq', 'ProcessDialogKey', 'G9QhwP38Rc', 'yiShtxQ5kv', 'niUhhRd76m'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, OxVokS2EHy4Z6aRHLG.csHigh entropy of concatenated method names: 'RTQeGLoIuP', 'vhceYFbZRZ', 'HeMeRoR3I4', 'obwekpxrAI', 'nh5emA60rd', 'o9teKN8Ykj', 'ewweNl5Mth', 'BHNe7NXsQV', 'AfGeVaYR6B', 'IaieDoTH44'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, VvMa2YtMfAErLVpMR9W.csHigh entropy of concatenated method names: 'CPTvWHGvac', 'QVKvzvqmMX', 'sMxiwJyh7O', 'W55JfOj8NTNRrDfGu8F', 'YJqmppjrCKwqVsGAIoS', 'E4t56ZjGnQfynsMmbNp', 'vQvdqojcIu7BrB8aTZ1', 'aB3g2djz2tyxV4dYUGu'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, nxrpA0RlMhYQGDbFB5.csHigh entropy of concatenated method names: 'TYP4UnuSod', 'zx14xVL18O', 'iGB4ABKp8N', 'Gqs4CPZQl7', 'rwn4BKBMZI', 'qwKAg0ayQU', 'LCRAbuOP5J', 'a55A1t9lQn', 'UxZAaZ2tvN', 'Yt2A8OnA8a'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, YR3UhFBCAwxsjWMigU.csHigh entropy of concatenated method names: 'A57MUq6rVO', 'mjfM9KAmTL', 'QgvMxsYWwY', 'gb1Mlsnbjc', 'KQrMA6cg9u', 'AY2M4UWPPG', 'vFBMCfFvVh', 'cbAMBJ168K', 'xYmMElyDG1', 'bMvMPtNlX6'
                Source: 0.2.MmF9tcIj1J.exe.478bb48.1.raw.unpack, yFqoYQzcZERJEEHrlC.csHigh entropy of concatenated method names: 'RE1f6KE7eZ', 'BeafGPK59m', 'RAgfY7nmGg', 'ruMfRdV2GA', 'zHAfkePlDm', 'hq3fmYP6u1', 'GKYfKRlgRh', 'WmffnyDJmo', 'AdGfpQIBKg', 'il6fXp6twb'
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: MmF9tcIj1J.exe PID: 7416, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CD324
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CD7E4
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CD944
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CD504
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CD544
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CD1E4
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105D0154
                Source: C:\Windows\SysWOW64\mshta.exeAPI/Special instruction interceptor: Address: 7FF9105CDA44
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 4C60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 7C10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 70C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 8C10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: 9C10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: A4F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: B4F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: C4F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B096E rdtsc 4_2_014B096E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeWindow / User API: threadDelayed 459Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeWindow / User API: threadDelayed 9514Jump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\mshta.exeAPI coverage: 2.8 %
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exe TID: 7436Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exe TID: 8124Thread sleep count: 459 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exe TID: 8124Thread sleep time: -918000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exe TID: 8124Thread sleep count: 9514 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exe TID: 8124Thread sleep time: -19028000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe TID: 8160Thread sleep time: -80000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe TID: 8160Thread sleep count: 41 > 30Jump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe TID: 8160Thread sleep time: -61500s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe TID: 8160Thread sleep count: 41 > 30Jump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe TID: 8160Thread sleep time: -41000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\mshta.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\mshta.exeCode function: 9_2_00A6C620 FindFirstFileW,FindNextFileW,FindClose,9_2_00A6C620
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: 3d8W0FR.9.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: 3d8W0FR.9.drBinary or memory string: discord.comVMware20,11696487552f
                Source: mshta.exe, 00000009.00000002.3691268424.0000000002D53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllq%Tve
                Source: 3d8W0FR.9.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: 3d8W0FR.9.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: 3d8W0FR.9.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: global block list test formVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: 3d8W0FR.9.drBinary or memory string: AMC password management pageVMware20,11696487552
                Source: firefox.exe, 0000000B.00000002.1801082486.0000020646D1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 3d8W0FR.9.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: 3d8W0FR.9.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3692100398.0000000000E49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6
                Source: 3d8W0FR.9.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: 3d8W0FR.9.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: 3d8W0FR.9.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: 3d8W0FR.9.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: 3d8W0FR.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: 3d8W0FR.9.drBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: 3d8W0FR.9.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: 3d8W0FR.9.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: 3d8W0FR.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: 3d8W0FR.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: 3d8W0FR.9.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B096E rdtsc 4_2_014B096E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_00417703 LdrLoadDll,4_2_00417703
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01508158 mov eax, dword ptr fs:[00000030h]4_2_01508158
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146C156 mov eax, dword ptr fs:[00000030h]4_2_0146C156
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476154 mov eax, dword ptr fs:[00000030h]4_2_01476154
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476154 mov eax, dword ptr fs:[00000030h]4_2_01476154
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01504144 mov eax, dword ptr fs:[00000030h]4_2_01504144
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01504144 mov eax, dword ptr fs:[00000030h]4_2_01504144
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01504144 mov ecx, dword ptr fs:[00000030h]4_2_01504144
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01504144 mov eax, dword ptr fs:[00000030h]4_2_01504144
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01504144 mov eax, dword ptr fs:[00000030h]4_2_01504144
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544164 mov eax, dword ptr fs:[00000030h]4_2_01544164
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544164 mov eax, dword ptr fs:[00000030h]4_2_01544164
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01530115 mov eax, dword ptr fs:[00000030h]4_2_01530115
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151A118 mov ecx, dword ptr fs:[00000030h]4_2_0151A118
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151A118 mov eax, dword ptr fs:[00000030h]4_2_0151A118
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151A118 mov eax, dword ptr fs:[00000030h]4_2_0151A118
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151A118 mov eax, dword ptr fs:[00000030h]4_2_0151A118
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov eax, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov ecx, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov eax, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov eax, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov ecx, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov eax, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov eax, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov ecx, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov eax, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E10E mov ecx, dword ptr fs:[00000030h]4_2_0151E10E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A0124 mov eax, dword ptr fs:[00000030h]4_2_014A0124
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015361C3 mov eax, dword ptr fs:[00000030h]4_2_015361C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015361C3 mov eax, dword ptr fs:[00000030h]4_2_015361C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE1D0 mov eax, dword ptr fs:[00000030h]4_2_014EE1D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE1D0 mov eax, dword ptr fs:[00000030h]4_2_014EE1D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE1D0 mov ecx, dword ptr fs:[00000030h]4_2_014EE1D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE1D0 mov eax, dword ptr fs:[00000030h]4_2_014EE1D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE1D0 mov eax, dword ptr fs:[00000030h]4_2_014EE1D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015461E5 mov eax, dword ptr fs:[00000030h]4_2_015461E5
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A01F8 mov eax, dword ptr fs:[00000030h]4_2_014A01F8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B0185 mov eax, dword ptr fs:[00000030h]4_2_014B0185
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F019F mov eax, dword ptr fs:[00000030h]4_2_014F019F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F019F mov eax, dword ptr fs:[00000030h]4_2_014F019F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F019F mov eax, dword ptr fs:[00000030h]4_2_014F019F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F019F mov eax, dword ptr fs:[00000030h]4_2_014F019F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146A197 mov eax, dword ptr fs:[00000030h]4_2_0146A197
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146A197 mov eax, dword ptr fs:[00000030h]4_2_0146A197
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146A197 mov eax, dword ptr fs:[00000030h]4_2_0146A197
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01514180 mov eax, dword ptr fs:[00000030h]4_2_01514180
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01514180 mov eax, dword ptr fs:[00000030h]4_2_01514180
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152C188 mov eax, dword ptr fs:[00000030h]4_2_0152C188
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152C188 mov eax, dword ptr fs:[00000030h]4_2_0152C188
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01472050 mov eax, dword ptr fs:[00000030h]4_2_01472050
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6050 mov eax, dword ptr fs:[00000030h]4_2_014F6050
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149C073 mov eax, dword ptr fs:[00000030h]4_2_0149C073
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F4000 mov ecx, dword ptr fs:[00000030h]4_2_014F4000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01512000 mov eax, dword ptr fs:[00000030h]4_2_01512000
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E016 mov eax, dword ptr fs:[00000030h]4_2_0148E016
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E016 mov eax, dword ptr fs:[00000030h]4_2_0148E016
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E016 mov eax, dword ptr fs:[00000030h]4_2_0148E016
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E016 mov eax, dword ptr fs:[00000030h]4_2_0148E016
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01506030 mov eax, dword ptr fs:[00000030h]4_2_01506030
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146A020 mov eax, dword ptr fs:[00000030h]4_2_0146A020
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146C020 mov eax, dword ptr fs:[00000030h]4_2_0146C020
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F20DE mov eax, dword ptr fs:[00000030h]4_2_014F20DE
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146A0E3 mov ecx, dword ptr fs:[00000030h]4_2_0146A0E3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014780E9 mov eax, dword ptr fs:[00000030h]4_2_014780E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F60E0 mov eax, dword ptr fs:[00000030h]4_2_014F60E0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146C0F0 mov eax, dword ptr fs:[00000030h]4_2_0146C0F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B20F0 mov ecx, dword ptr fs:[00000030h]4_2_014B20F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147208A mov eax, dword ptr fs:[00000030h]4_2_0147208A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014680A0 mov eax, dword ptr fs:[00000030h]4_2_014680A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015360B8 mov eax, dword ptr fs:[00000030h]4_2_015360B8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015360B8 mov ecx, dword ptr fs:[00000030h]4_2_015360B8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015080A8 mov eax, dword ptr fs:[00000030h]4_2_015080A8
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153A352 mov eax, dword ptr fs:[00000030h]4_2_0153A352
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F2349 mov eax, dword ptr fs:[00000030h]4_2_014F2349
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F035C mov eax, dword ptr fs:[00000030h]4_2_014F035C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F035C mov eax, dword ptr fs:[00000030h]4_2_014F035C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F035C mov eax, dword ptr fs:[00000030h]4_2_014F035C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F035C mov ecx, dword ptr fs:[00000030h]4_2_014F035C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F035C mov eax, dword ptr fs:[00000030h]4_2_014F035C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F035C mov eax, dword ptr fs:[00000030h]4_2_014F035C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0154634F mov eax, dword ptr fs:[00000030h]4_2_0154634F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151437C mov eax, dword ptr fs:[00000030h]4_2_0151437C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA30B mov eax, dword ptr fs:[00000030h]4_2_014AA30B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA30B mov eax, dword ptr fs:[00000030h]4_2_014AA30B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA30B mov eax, dword ptr fs:[00000030h]4_2_014AA30B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146C310 mov ecx, dword ptr fs:[00000030h]4_2_0146C310
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01490310 mov ecx, dword ptr fs:[00000030h]4_2_01490310
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015143D4 mov eax, dword ptr fs:[00000030h]4_2_015143D4
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015143D4 mov eax, dword ptr fs:[00000030h]4_2_015143D4
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A3C0 mov eax, dword ptr fs:[00000030h]4_2_0147A3C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A3C0 mov eax, dword ptr fs:[00000030h]4_2_0147A3C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A3C0 mov eax, dword ptr fs:[00000030h]4_2_0147A3C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A3C0 mov eax, dword ptr fs:[00000030h]4_2_0147A3C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A3C0 mov eax, dword ptr fs:[00000030h]4_2_0147A3C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A3C0 mov eax, dword ptr fs:[00000030h]4_2_0147A3C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014783C0 mov eax, dword ptr fs:[00000030h]4_2_014783C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014783C0 mov eax, dword ptr fs:[00000030h]4_2_014783C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014783C0 mov eax, dword ptr fs:[00000030h]4_2_014783C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014783C0 mov eax, dword ptr fs:[00000030h]4_2_014783C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E3DB mov eax, dword ptr fs:[00000030h]4_2_0151E3DB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E3DB mov eax, dword ptr fs:[00000030h]4_2_0151E3DB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E3DB mov ecx, dword ptr fs:[00000030h]4_2_0151E3DB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151E3DB mov eax, dword ptr fs:[00000030h]4_2_0151E3DB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F63C0 mov eax, dword ptr fs:[00000030h]4_2_014F63C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152C3CD mov eax, dword ptr fs:[00000030h]4_2_0152C3CD
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014803E9 mov eax, dword ptr fs:[00000030h]4_2_014803E9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A63FF mov eax, dword ptr fs:[00000030h]4_2_014A63FF
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E3F0 mov eax, dword ptr fs:[00000030h]4_2_0148E3F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E3F0 mov eax, dword ptr fs:[00000030h]4_2_0148E3F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E3F0 mov eax, dword ptr fs:[00000030h]4_2_0148E3F0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149438F mov eax, dword ptr fs:[00000030h]4_2_0149438F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149438F mov eax, dword ptr fs:[00000030h]4_2_0149438F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146E388 mov eax, dword ptr fs:[00000030h]4_2_0146E388
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146E388 mov eax, dword ptr fs:[00000030h]4_2_0146E388
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146E388 mov eax, dword ptr fs:[00000030h]4_2_0146E388
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01468397 mov eax, dword ptr fs:[00000030h]4_2_01468397
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01468397 mov eax, dword ptr fs:[00000030h]4_2_01468397
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01468397 mov eax, dword ptr fs:[00000030h]4_2_01468397
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152A250 mov eax, dword ptr fs:[00000030h]4_2_0152A250
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152A250 mov eax, dword ptr fs:[00000030h]4_2_0152A250
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0154625D mov eax, dword ptr fs:[00000030h]4_2_0154625D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F8243 mov eax, dword ptr fs:[00000030h]4_2_014F8243
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F8243 mov ecx, dword ptr fs:[00000030h]4_2_014F8243
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146A250 mov eax, dword ptr fs:[00000030h]4_2_0146A250
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476259 mov eax, dword ptr fs:[00000030h]4_2_01476259
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01520274 mov eax, dword ptr fs:[00000030h]4_2_01520274
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474260 mov eax, dword ptr fs:[00000030h]4_2_01474260
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474260 mov eax, dword ptr fs:[00000030h]4_2_01474260
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474260 mov eax, dword ptr fs:[00000030h]4_2_01474260
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146826B mov eax, dword ptr fs:[00000030h]4_2_0146826B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146823B mov eax, dword ptr fs:[00000030h]4_2_0146823B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015462D6 mov eax, dword ptr fs:[00000030h]4_2_015462D6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A2C3 mov eax, dword ptr fs:[00000030h]4_2_0147A2C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A2C3 mov eax, dword ptr fs:[00000030h]4_2_0147A2C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A2C3 mov eax, dword ptr fs:[00000030h]4_2_0147A2C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A2C3 mov eax, dword ptr fs:[00000030h]4_2_0147A2C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A2C3 mov eax, dword ptr fs:[00000030h]4_2_0147A2C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014802E1 mov eax, dword ptr fs:[00000030h]4_2_014802E1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014802E1 mov eax, dword ptr fs:[00000030h]4_2_014802E1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014802E1 mov eax, dword ptr fs:[00000030h]4_2_014802E1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F0283 mov eax, dword ptr fs:[00000030h]4_2_014F0283
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F0283 mov eax, dword ptr fs:[00000030h]4_2_014F0283
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F0283 mov eax, dword ptr fs:[00000030h]4_2_014F0283
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE284 mov eax, dword ptr fs:[00000030h]4_2_014AE284
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE284 mov eax, dword ptr fs:[00000030h]4_2_014AE284
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014802A0 mov eax, dword ptr fs:[00000030h]4_2_014802A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014802A0 mov eax, dword ptr fs:[00000030h]4_2_014802A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015062A0 mov eax, dword ptr fs:[00000030h]4_2_015062A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015062A0 mov ecx, dword ptr fs:[00000030h]4_2_015062A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015062A0 mov eax, dword ptr fs:[00000030h]4_2_015062A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015062A0 mov eax, dword ptr fs:[00000030h]4_2_015062A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015062A0 mov eax, dword ptr fs:[00000030h]4_2_015062A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015062A0 mov eax, dword ptr fs:[00000030h]4_2_015062A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478550 mov eax, dword ptr fs:[00000030h]4_2_01478550
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478550 mov eax, dword ptr fs:[00000030h]4_2_01478550
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A656A mov eax, dword ptr fs:[00000030h]4_2_014A656A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A656A mov eax, dword ptr fs:[00000030h]4_2_014A656A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A656A mov eax, dword ptr fs:[00000030h]4_2_014A656A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01506500 mov eax, dword ptr fs:[00000030h]4_2_01506500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544500 mov eax, dword ptr fs:[00000030h]4_2_01544500
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E53E mov eax, dword ptr fs:[00000030h]4_2_0149E53E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E53E mov eax, dword ptr fs:[00000030h]4_2_0149E53E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E53E mov eax, dword ptr fs:[00000030h]4_2_0149E53E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E53E mov eax, dword ptr fs:[00000030h]4_2_0149E53E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E53E mov eax, dword ptr fs:[00000030h]4_2_0149E53E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480535 mov eax, dword ptr fs:[00000030h]4_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480535 mov eax, dword ptr fs:[00000030h]4_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480535 mov eax, dword ptr fs:[00000030h]4_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480535 mov eax, dword ptr fs:[00000030h]4_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480535 mov eax, dword ptr fs:[00000030h]4_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480535 mov eax, dword ptr fs:[00000030h]4_2_01480535
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE5CF mov eax, dword ptr fs:[00000030h]4_2_014AE5CF
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE5CF mov eax, dword ptr fs:[00000030h]4_2_014AE5CF
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014765D0 mov eax, dword ptr fs:[00000030h]4_2_014765D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA5D0 mov eax, dword ptr fs:[00000030h]4_2_014AA5D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA5D0 mov eax, dword ptr fs:[00000030h]4_2_014AA5D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014725E0 mov eax, dword ptr fs:[00000030h]4_2_014725E0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC5ED mov eax, dword ptr fs:[00000030h]4_2_014AC5ED
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC5ED mov eax, dword ptr fs:[00000030h]4_2_014AC5ED
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E5E7 mov eax, dword ptr fs:[00000030h]4_2_0149E5E7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A4588 mov eax, dword ptr fs:[00000030h]4_2_014A4588
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01472582 mov eax, dword ptr fs:[00000030h]4_2_01472582
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01472582 mov ecx, dword ptr fs:[00000030h]4_2_01472582
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE59C mov eax, dword ptr fs:[00000030h]4_2_014AE59C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F05A7 mov eax, dword ptr fs:[00000030h]4_2_014F05A7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F05A7 mov eax, dword ptr fs:[00000030h]4_2_014F05A7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F05A7 mov eax, dword ptr fs:[00000030h]4_2_014F05A7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014945B1 mov eax, dword ptr fs:[00000030h]4_2_014945B1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014945B1 mov eax, dword ptr fs:[00000030h]4_2_014945B1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152A456 mov eax, dword ptr fs:[00000030h]4_2_0152A456
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AE443 mov eax, dword ptr fs:[00000030h]4_2_014AE443
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149245A mov eax, dword ptr fs:[00000030h]4_2_0149245A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146645D mov eax, dword ptr fs:[00000030h]4_2_0146645D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FC460 mov ecx, dword ptr fs:[00000030h]4_2_014FC460
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149A470 mov eax, dword ptr fs:[00000030h]4_2_0149A470
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149A470 mov eax, dword ptr fs:[00000030h]4_2_0149A470
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149A470 mov eax, dword ptr fs:[00000030h]4_2_0149A470
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A8402 mov eax, dword ptr fs:[00000030h]4_2_014A8402
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A8402 mov eax, dword ptr fs:[00000030h]4_2_014A8402
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A8402 mov eax, dword ptr fs:[00000030h]4_2_014A8402
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146C427 mov eax, dword ptr fs:[00000030h]4_2_0146C427
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146E420 mov eax, dword ptr fs:[00000030h]4_2_0146E420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146E420 mov eax, dword ptr fs:[00000030h]4_2_0146E420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146E420 mov eax, dword ptr fs:[00000030h]4_2_0146E420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F6420 mov eax, dword ptr fs:[00000030h]4_2_014F6420
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA430 mov eax, dword ptr fs:[00000030h]4_2_014AA430
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014704E5 mov ecx, dword ptr fs:[00000030h]4_2_014704E5
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0152A49A mov eax, dword ptr fs:[00000030h]4_2_0152A49A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014764AB mov eax, dword ptr fs:[00000030h]4_2_014764AB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A44B0 mov ecx, dword ptr fs:[00000030h]4_2_014A44B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FA4B0 mov eax, dword ptr fs:[00000030h]4_2_014FA4B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A674D mov esi, dword ptr fs:[00000030h]4_2_014A674D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A674D mov eax, dword ptr fs:[00000030h]4_2_014A674D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A674D mov eax, dword ptr fs:[00000030h]4_2_014A674D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FE75D mov eax, dword ptr fs:[00000030h]4_2_014FE75D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470750 mov eax, dword ptr fs:[00000030h]4_2_01470750
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F4755 mov eax, dword ptr fs:[00000030h]4_2_014F4755
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2750 mov eax, dword ptr fs:[00000030h]4_2_014B2750
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2750 mov eax, dword ptr fs:[00000030h]4_2_014B2750
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478770 mov eax, dword ptr fs:[00000030h]4_2_01478770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480770 mov eax, dword ptr fs:[00000030h]4_2_01480770
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC700 mov eax, dword ptr fs:[00000030h]4_2_014AC700
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470710 mov eax, dword ptr fs:[00000030h]4_2_01470710
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A0710 mov eax, dword ptr fs:[00000030h]4_2_014A0710
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC720 mov eax, dword ptr fs:[00000030h]4_2_014AC720
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC720 mov eax, dword ptr fs:[00000030h]4_2_014AC720
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A273C mov eax, dword ptr fs:[00000030h]4_2_014A273C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A273C mov ecx, dword ptr fs:[00000030h]4_2_014A273C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A273C mov eax, dword ptr fs:[00000030h]4_2_014A273C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EC730 mov eax, dword ptr fs:[00000030h]4_2_014EC730
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147C7C0 mov eax, dword ptr fs:[00000030h]4_2_0147C7C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F07C3 mov eax, dword ptr fs:[00000030h]4_2_014F07C3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014927ED mov eax, dword ptr fs:[00000030h]4_2_014927ED
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014927ED mov eax, dword ptr fs:[00000030h]4_2_014927ED
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014927ED mov eax, dword ptr fs:[00000030h]4_2_014927ED
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FE7E1 mov eax, dword ptr fs:[00000030h]4_2_014FE7E1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014747FB mov eax, dword ptr fs:[00000030h]4_2_014747FB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014747FB mov eax, dword ptr fs:[00000030h]4_2_014747FB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151678E mov eax, dword ptr fs:[00000030h]4_2_0151678E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014707AF mov eax, dword ptr fs:[00000030h]4_2_014707AF
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015247A0 mov eax, dword ptr fs:[00000030h]4_2_015247A0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148C640 mov eax, dword ptr fs:[00000030h]4_2_0148C640
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA660 mov eax, dword ptr fs:[00000030h]4_2_014AA660
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA660 mov eax, dword ptr fs:[00000030h]4_2_014AA660
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153866E mov eax, dword ptr fs:[00000030h]4_2_0153866E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153866E mov eax, dword ptr fs:[00000030h]4_2_0153866E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A2674 mov eax, dword ptr fs:[00000030h]4_2_014A2674
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148260B mov eax, dword ptr fs:[00000030h]4_2_0148260B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE609 mov eax, dword ptr fs:[00000030h]4_2_014EE609
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B2619 mov eax, dword ptr fs:[00000030h]4_2_014B2619
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A6620 mov eax, dword ptr fs:[00000030h]4_2_014A6620
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A8620 mov eax, dword ptr fs:[00000030h]4_2_014A8620
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147262C mov eax, dword ptr fs:[00000030h]4_2_0147262C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0148E627 mov eax, dword ptr fs:[00000030h]4_2_0148E627
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA6C7 mov ebx, dword ptr fs:[00000030h]4_2_014AA6C7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA6C7 mov eax, dword ptr fs:[00000030h]4_2_014AA6C7
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE6F2 mov eax, dword ptr fs:[00000030h]4_2_014EE6F2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE6F2 mov eax, dword ptr fs:[00000030h]4_2_014EE6F2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE6F2 mov eax, dword ptr fs:[00000030h]4_2_014EE6F2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE6F2 mov eax, dword ptr fs:[00000030h]4_2_014EE6F2
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F06F1 mov eax, dword ptr fs:[00000030h]4_2_014F06F1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F06F1 mov eax, dword ptr fs:[00000030h]4_2_014F06F1
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474690 mov eax, dword ptr fs:[00000030h]4_2_01474690
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474690 mov eax, dword ptr fs:[00000030h]4_2_01474690
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC6A6 mov eax, dword ptr fs:[00000030h]4_2_014AC6A6
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A66B0 mov eax, dword ptr fs:[00000030h]4_2_014A66B0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F0946 mov eax, dword ptr fs:[00000030h]4_2_014F0946
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544940 mov eax, dword ptr fs:[00000030h]4_2_01544940
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B096E mov eax, dword ptr fs:[00000030h]4_2_014B096E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B096E mov edx, dword ptr fs:[00000030h]4_2_014B096E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014B096E mov eax, dword ptr fs:[00000030h]4_2_014B096E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01514978 mov eax, dword ptr fs:[00000030h]4_2_01514978
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01514978 mov eax, dword ptr fs:[00000030h]4_2_01514978
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01496962 mov eax, dword ptr fs:[00000030h]4_2_01496962
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01496962 mov eax, dword ptr fs:[00000030h]4_2_01496962
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01496962 mov eax, dword ptr fs:[00000030h]4_2_01496962
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FC97C mov eax, dword ptr fs:[00000030h]4_2_014FC97C
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE908 mov eax, dword ptr fs:[00000030h]4_2_014EE908
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EE908 mov eax, dword ptr fs:[00000030h]4_2_014EE908
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FC912 mov eax, dword ptr fs:[00000030h]4_2_014FC912
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01468918 mov eax, dword ptr fs:[00000030h]4_2_01468918
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01468918 mov eax, dword ptr fs:[00000030h]4_2_01468918
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F892A mov eax, dword ptr fs:[00000030h]4_2_014F892A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0150892B mov eax, dword ptr fs:[00000030h]4_2_0150892B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153A9D3 mov eax, dword ptr fs:[00000030h]4_2_0153A9D3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015069C0 mov eax, dword ptr fs:[00000030h]4_2_015069C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A9D0 mov eax, dword ptr fs:[00000030h]4_2_0147A9D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A9D0 mov eax, dword ptr fs:[00000030h]4_2_0147A9D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A9D0 mov eax, dword ptr fs:[00000030h]4_2_0147A9D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A9D0 mov eax, dword ptr fs:[00000030h]4_2_0147A9D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A9D0 mov eax, dword ptr fs:[00000030h]4_2_0147A9D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147A9D0 mov eax, dword ptr fs:[00000030h]4_2_0147A9D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A49D0 mov eax, dword ptr fs:[00000030h]4_2_014A49D0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FE9E0 mov eax, dword ptr fs:[00000030h]4_2_014FE9E0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A29F9 mov eax, dword ptr fs:[00000030h]4_2_014A29F9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A29F9 mov eax, dword ptr fs:[00000030h]4_2_014A29F9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014709AD mov eax, dword ptr fs:[00000030h]4_2_014709AD
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014709AD mov eax, dword ptr fs:[00000030h]4_2_014709AD
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F89B3 mov esi, dword ptr fs:[00000030h]4_2_014F89B3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F89B3 mov eax, dword ptr fs:[00000030h]4_2_014F89B3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014F89B3 mov eax, dword ptr fs:[00000030h]4_2_014F89B3
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474859 mov eax, dword ptr fs:[00000030h]4_2_01474859
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01474859 mov eax, dword ptr fs:[00000030h]4_2_01474859
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A0854 mov eax, dword ptr fs:[00000030h]4_2_014A0854
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01506870 mov eax, dword ptr fs:[00000030h]4_2_01506870
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01506870 mov eax, dword ptr fs:[00000030h]4_2_01506870
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FE872 mov eax, dword ptr fs:[00000030h]4_2_014FE872
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FE872 mov eax, dword ptr fs:[00000030h]4_2_014FE872
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FC810 mov eax, dword ptr fs:[00000030h]4_2_014FC810
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151483A mov eax, dword ptr fs:[00000030h]4_2_0151483A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151483A mov eax, dword ptr fs:[00000030h]4_2_0151483A
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AA830 mov eax, dword ptr fs:[00000030h]4_2_014AA830
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492835 mov eax, dword ptr fs:[00000030h]4_2_01492835
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492835 mov eax, dword ptr fs:[00000030h]4_2_01492835
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492835 mov eax, dword ptr fs:[00000030h]4_2_01492835
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492835 mov ecx, dword ptr fs:[00000030h]4_2_01492835
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492835 mov eax, dword ptr fs:[00000030h]4_2_01492835
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01492835 mov eax, dword ptr fs:[00000030h]4_2_01492835
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149E8C0 mov eax, dword ptr fs:[00000030h]4_2_0149E8C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_015408C0 mov eax, dword ptr fs:[00000030h]4_2_015408C0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC8F9 mov eax, dword ptr fs:[00000030h]4_2_014AC8F9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AC8F9 mov eax, dword ptr fs:[00000030h]4_2_014AC8F9
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153A8E4 mov eax, dword ptr fs:[00000030h]4_2_0153A8E4
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470887 mov eax, dword ptr fs:[00000030h]4_2_01470887
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FC89D mov eax, dword ptr fs:[00000030h]4_2_014FC89D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151EB50 mov eax, dword ptr fs:[00000030h]4_2_0151EB50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01542B57 mov eax, dword ptr fs:[00000030h]4_2_01542B57
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01542B57 mov eax, dword ptr fs:[00000030h]4_2_01542B57
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01542B57 mov eax, dword ptr fs:[00000030h]4_2_01542B57
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01542B57 mov eax, dword ptr fs:[00000030h]4_2_01542B57
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01506B40 mov eax, dword ptr fs:[00000030h]4_2_01506B40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01506B40 mov eax, dword ptr fs:[00000030h]4_2_01506B40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0153AB40 mov eax, dword ptr fs:[00000030h]4_2_0153AB40
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01518B42 mov eax, dword ptr fs:[00000030h]4_2_01518B42
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01468B50 mov eax, dword ptr fs:[00000030h]4_2_01468B50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01524B4B mov eax, dword ptr fs:[00000030h]4_2_01524B4B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01524B4B mov eax, dword ptr fs:[00000030h]4_2_01524B4B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0146CB7E mov eax, dword ptr fs:[00000030h]4_2_0146CB7E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014EEB1D mov eax, dword ptr fs:[00000030h]4_2_014EEB1D
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544B00 mov eax, dword ptr fs:[00000030h]4_2_01544B00
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149EB20 mov eax, dword ptr fs:[00000030h]4_2_0149EB20
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149EB20 mov eax, dword ptr fs:[00000030h]4_2_0149EB20
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01538B28 mov eax, dword ptr fs:[00000030h]4_2_01538B28
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01538B28 mov eax, dword ptr fs:[00000030h]4_2_01538B28
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151EBD0 mov eax, dword ptr fs:[00000030h]4_2_0151EBD0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01490BCB mov eax, dword ptr fs:[00000030h]4_2_01490BCB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01490BCB mov eax, dword ptr fs:[00000030h]4_2_01490BCB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01490BCB mov eax, dword ptr fs:[00000030h]4_2_01490BCB
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470BCD mov eax, dword ptr fs:[00000030h]4_2_01470BCD
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470BCD mov eax, dword ptr fs:[00000030h]4_2_01470BCD
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470BCD mov eax, dword ptr fs:[00000030h]4_2_01470BCD
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149EBFC mov eax, dword ptr fs:[00000030h]4_2_0149EBFC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478BF0 mov eax, dword ptr fs:[00000030h]4_2_01478BF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478BF0 mov eax, dword ptr fs:[00000030h]4_2_01478BF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478BF0 mov eax, dword ptr fs:[00000030h]4_2_01478BF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FCBF0 mov eax, dword ptr fs:[00000030h]4_2_014FCBF0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01524BB0 mov eax, dword ptr fs:[00000030h]4_2_01524BB0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01524BB0 mov eax, dword ptr fs:[00000030h]4_2_01524BB0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480BBE mov eax, dword ptr fs:[00000030h]4_2_01480BBE
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480BBE mov eax, dword ptr fs:[00000030h]4_2_01480BBE
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480A5B mov eax, dword ptr fs:[00000030h]4_2_01480A5B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01480A5B mov eax, dword ptr fs:[00000030h]4_2_01480A5B
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01476A50 mov eax, dword ptr fs:[00000030h]4_2_01476A50
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ACA6F mov eax, dword ptr fs:[00000030h]4_2_014ACA6F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ACA6F mov eax, dword ptr fs:[00000030h]4_2_014ACA6F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ACA6F mov eax, dword ptr fs:[00000030h]4_2_014ACA6F
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0151EA60 mov eax, dword ptr fs:[00000030h]4_2_0151EA60
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ECA72 mov eax, dword ptr fs:[00000030h]4_2_014ECA72
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ECA72 mov eax, dword ptr fs:[00000030h]4_2_014ECA72
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014FCA11 mov eax, dword ptr fs:[00000030h]4_2_014FCA11
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0149EA2E mov eax, dword ptr fs:[00000030h]4_2_0149EA2E
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ACA24 mov eax, dword ptr fs:[00000030h]4_2_014ACA24
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014ACA38 mov eax, dword ptr fs:[00000030h]4_2_014ACA38
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01494A35 mov eax, dword ptr fs:[00000030h]4_2_01494A35
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01494A35 mov eax, dword ptr fs:[00000030h]4_2_01494A35
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C6ACC mov eax, dword ptr fs:[00000030h]4_2_014C6ACC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C6ACC mov eax, dword ptr fs:[00000030h]4_2_014C6ACC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C6ACC mov eax, dword ptr fs:[00000030h]4_2_014C6ACC
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470AD0 mov eax, dword ptr fs:[00000030h]4_2_01470AD0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A4AD0 mov eax, dword ptr fs:[00000030h]4_2_014A4AD0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A4AD0 mov eax, dword ptr fs:[00000030h]4_2_014A4AD0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AAAEE mov eax, dword ptr fs:[00000030h]4_2_014AAAEE
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014AAAEE mov eax, dword ptr fs:[00000030h]4_2_014AAAEE
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_0147EA80 mov eax, dword ptr fs:[00000030h]4_2_0147EA80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01544A80 mov eax, dword ptr fs:[00000030h]4_2_01544A80
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014A8A90 mov edx, dword ptr fs:[00000030h]4_2_014A8A90
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478AA0 mov eax, dword ptr fs:[00000030h]4_2_01478AA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478AA0 mov eax, dword ptr fs:[00000030h]4_2_01478AA0
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_014C6AA4 mov eax, dword ptr fs:[00000030h]4_2_014C6AA4
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470D59 mov eax, dword ptr fs:[00000030h]4_2_01470D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470D59 mov eax, dword ptr fs:[00000030h]4_2_01470D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01470D59 mov eax, dword ptr fs:[00000030h]4_2_01470D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478D59 mov eax, dword ptr fs:[00000030h]4_2_01478D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478D59 mov eax, dword ptr fs:[00000030h]4_2_01478D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478D59 mov eax, dword ptr fs:[00000030h]4_2_01478D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478D59 mov eax, dword ptr fs:[00000030h]4_2_01478D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeCode function: 4_2_01478D59 mov eax, dword ptr fs:[00000030h]4_2_01478D59
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtAllocateVirtualMemory: Direct from: 0x77172BFCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtDelayExecution: Direct from: 0x77172DDCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtProtectVirtualMemory: Direct from: 0x77167B2EJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtQuerySystemInformation: Direct from: 0x77172DFCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtReadFile: Direct from: 0x77172ADCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtQueryInformationProcess: Direct from: 0x77172C26Jump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtResumeThread: Direct from: 0x77172FBCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtWriteVirtualMemory: Direct from: 0x7717490CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtCreateUserProcess: Direct from: 0x7717371CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtOpenKeyEx: Direct from: 0x77172B9CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtNotifyChangeKey: Direct from: 0x77173C2CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtSetInformationProcess: Direct from: 0x77172C5CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtProtectVirtualMemory: Direct from: 0x77172F9CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtResumeThread: Direct from: 0x771736ACJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtMapViewOfSection: Direct from: 0x77172D1CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtWriteVirtualMemory: Direct from: 0x77172E3CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtUnmapViewOfSection: Direct from: 0x77172D3CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtCreateMutant: Direct from: 0x771735CCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtDeviceIoControlFile: Direct from: 0x77172AECJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtAllocateVirtualMemory: Direct from: 0x77172BECJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtTerminateThread: Direct from: 0x77172FCCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtQueryInformationToken: Direct from: 0x77172CACJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtCreateFile: Direct from: 0x77172FECJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtOpenFile: Direct from: 0x77172DCCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtClose: Direct from: 0x77172B6C
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtSetInformationThread: Direct from: 0x771663F9Jump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtAllocateVirtualMemory: Direct from: 0x77173C9CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtQueryAttributesFile: Direct from: 0x77172E6CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtSetInformationThread: Direct from: 0x77172B4CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtReadVirtualMemory: Direct from: 0x77172E8CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtCreateKey: Direct from: 0x77172C6CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtQueryVolumeInformationFile: Direct from: 0x77172F2CJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtAllocateVirtualMemory: Direct from: 0x771748ECJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtQuerySystemInformation: Direct from: 0x771748CCJump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeNtOpenSection: Direct from: 0x77172E0CJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeMemory written: C:\Users\user\Desktop\MmF9tcIj1J.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: NULL target: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeSection loaded: NULL target: C:\Windows\SysWOW64\mshta.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: NULL target: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: NULL target: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeThread register set: target process: 2532Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeThread APC queued: target process: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeProcess created: C:\Users\user\Desktop\MmF9tcIj1J.exe "C:\Users\user\Desktop\MmF9tcIj1J.exe"Jump to behavior
                Source: C:\Program Files (x86)\JLPBoEOYAtaoUASuKgNkEBVRzCNblPEwaoLEXuwIApuxzButuuTGOlQayWTq\lq9nGfkZ7JbZdUv7.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3692264556.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000000.1429441257.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3692497686.00000000013B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3692264556.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000000.1429441257.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3692497686.00000000013B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3692264556.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000000.1429441257.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3692497686.00000000013B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerW
                Source: lq9nGfkZ7JbZdUv7.exe, 00000008.00000002.3692264556.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 00000008.00000000.1429441257.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, lq9nGfkZ7JbZdUv7.exe, 0000000A.00000002.3692497686.00000000013B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeQueries volume information: C:\Users\user\Desktop\MmF9tcIj1J.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\MmF9tcIj1J.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3692877173.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3695080703.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3690653132.0000000000A50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3692941025.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1508811235.00000000017E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3692821369.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1506820467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509021015.0000000002D20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.MmF9tcIj1J.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3692877173.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3695080703.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3690653132.0000000000A50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3692941025.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1508811235.00000000017E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3692821369.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1506820467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509021015.0000000002D20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                412
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                121
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                41
                Virtualization/Sandbox Evasion
                Security Account Manager41
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                5
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture5
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets2
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Abuse Elevation Control Mechanism
                Cached Domain Credentials113
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
                Obfuscated Files or Information
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                Software Packing
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632372 Sample: MmF9tcIj1J.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 31 www.nullus.xyz 2->31 33 www.iquery.xyz 2->33 35 18 other IPs or domains 2->35 45 Suricata IDS alerts for network traffic 2->45 47 Antivirus detection for URL or domain 2->47 49 Antivirus / Scanner detection for submitted sample 2->49 53 5 other signatures 2->53 10 MmF9tcIj1J.exe 3 2->10         started        signatures3 51 Performs DNS queries to domains with low reputation 33->51 process4 file5 29 C:\Users\user\AppData\...\MmF9tcIj1J.exe.log, ASCII 10->29 dropped 65 Injects a PE file into a foreign processes 10->65 14 MmF9tcIj1J.exe 10->14         started        signatures6 process7 signatures8 67 Maps a DLL or memory area into another process 14->67 17 lq9nGfkZ7JbZdUv7.exe 14->17 injected process9 signatures10 43 Found direct / indirect Syscall (likely to bypass EDR) 17->43 20 mshta.exe 13 17->20         started        process11 signatures12 55 Tries to steal Mail credentials (via file / registry access) 20->55 57 Tries to harvest and steal browser information (history, passwords, etc) 20->57 59 Modifies the context of a thread in another process (thread injection) 20->59 61 3 other signatures 20->61 23 lq9nGfkZ7JbZdUv7.exe 20->23 injected 27 firefox.exe 20->27         started        process13 dnsIp14 37 luittard-le-mode.shop 84.32.84.32, 49738, 49739, 49740 NTT-LT-ASLT Lithuania 23->37 39 www.innonow.website 162.0.225.218, 49694, 49695, 49696 NAMECHEAP-NETUS Canada 23->39 41 9 other IPs or domains 23->41 63 Found direct / indirect Syscall (likely to bypass EDR) 23->63 signatures15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.